IARIA

Displaying 241-280 of 1218 results

  • White Papers // Jul 2012

    Datanode Optimization in Distributed Storage Systems

    Distributed storage systems designed for small files have been developing rapidly, like Facebook's hayStack, Twitter's Cassandra and so on. But, under the authors' observation, there are still some drawbacks in these systems. For example, they do not have cache specified for files and have not taken the relationship inherent in...

    Provided By IARIA

  • White Papers // Jul 2012

    Towards a Scalable Cloud-Based RDF Storage Offering a Pub/Sub Query Service

    Recently, Complex Event Processing engines have gained more and more interest. Their purpose consists in combining real-time and historical data in addition to knowledge bases to deduce new information. Also, RDF is now commonly used to make information machine-processable. In this paper, the authors propose to leverage existing research about...

    Provided By IARIA

  • White Papers // Jul 2012

    Cloud Computing Brokering Service: A Trust Framework Service Level Agreements: An Analytical Study in Progress

    The paper highlights existing research voids in defining and designing binding and enforceable Service Level Agreements (SLA) between three actors in the cloud computing framework defined by NIST - the cloud brokers, the cloud consumers and the cloud providers. The paper presents a techno-managerial perspective to the issue of how...

    Provided By IARIA

  • White Papers // Jul 2012

    User as Innovator in IT Development Process

    Encouraging users to be value creators in IT development processes is an important step in the competitive effectiveness increase activity. Many authors argue the user involvement in IT process is critical for IT implementation success because under the service-dominant logic users are contributing to the process of IT exploitation. In...

    Provided By IARIA

  • White Papers // Jul 2012

    Decentralized Probabilistic Auto-Scaling for Heterogeneous Systems

    Scalability has become a de facto non-functional requirement for today's Internet applications that start small and aim to become a huge success. The ability of the system to automatically scale is required by the dynamic nature of the workload experienced by these applications. In this context, the DEPAS (DEcentralized Probabilistic...

    Provided By IARIA

  • White Papers // Jul 2012

    IDSaaS: Intrusion Detection System as a Service in Public Clouds

    In a public cloud computing environment, consumers cannot always just depend on the cloud provider's security infrastructure. They may need to monitor and protect their virtual existence by implementing their own intrusion detection capabilities along with other security technologies within the cloud fabric. Intrusion Detection as a Service (IDSaaS) targets...

    Provided By IARIA

  • White Papers // Jul 2012

    A Study of Cloud Mobility in a Mobile Cloud Network Based on Future Internet Approach

    In this paper, the authors extend the limited functionality of the GENI Cloud project as follows. First, they use the OpenStack cloud platform instead of the Eucalyptus cloud platform used in the GENI Cloud. Second, they develop the FiRST Cloud Aggregate Manager (AM) based on GENI AM Application Programming Interface...

    Provided By IARIA

  • White Papers // Jul 2012

    Simulation-based Evaluation of an Intercloud Service Broker

    The lack of common standards in a fast emerging Cloud computing market over the last years resulted in \"Vendor lock in\" and interoperability issues across heterogeneous Cloud platforms. Therefore, the Cloud user is facing now a challenging problem of selecting the Cloud provider that fits his needs. A new promising...

    Provided By IARIA

  • White Papers // Jul 2012

    De-Replication: A Dynamic Memory-Aware Mechanism

    Resource replication in distributed environment produces issues of secondary storage. De-replication of resources is required when replication mechanism is hindered due to lack of secondary storage. This paper introduces de-replication approaches that depend upon last modification time, number of replica available and resource size. Comparative study shows that de-replication can...

    Provided By IARIA

  • White Papers // Jul 2012

    Dynamic Scenarios of Trust Establishment in the Public Cloud Service Market

    The adoption of the public cloud by firms and individuals has been slowed because of the lack of trust. This research seeks the rules of trust establishment between the public cloud providers and users through signaling game theory, analyses dynamic scenarios in which the pervasive distrust arises, and suggests policy...

    Provided By IARIA

  • White Papers // Jul 2012

    A Secure Data Access Mechanism for Cloud Tenants

    As the future big data storage center for tenants, cloud computing has been a hot issue recently, it consists of many large datacenters which are usually geographically distributed and heterogeneous, secure data access from cloud computing platform is a big challenge for cloud tenants. In this paper, the authors present...

    Provided By IARIA

  • White Papers // Jul 2012

    Provenance in the Cloud: Why and How?

    Provenance is an important aspect in the verification, audit trails, reproducibility, privacy and security, trust, and reliability in many fields ranging from art, food production, medical sciences, in-silico experiments, and distributed computing. On the other hand, Cloud computing is the business model of distributed computing and is considered the next...

    Provided By IARIA

  • White Papers // Jul 2012

    Mobile Cloud Computing Environment as a Support for Mobile Learning

    This paper presents a new model of Mobile Distance Learning system (MDL) in an extended Mobile Cloud Computing environment (MCC) by using High Performance Computing (HPC) Cluster Infrastructure, as well as some existing videoconferencing technologies enriched with mobile and wireless devices. This MCC model can be applied everywhere where there...

    Provided By IARIA

  • White Papers // Jul 2012

    Intercloud Object Storage Service: Colony

    Cloud computing has the potential to dramatically change software engineering. It allows the user to manage and use large-scale computing resources efficiently and easily. Moreover, it makes it possible to develop new software by using these resources for scalability and lowering costs. For example, users can prepare machine images of...

    Provided By IARIA

  • White Papers // Jul 2012

    Enterprise Architecture Ontology for Services Computing

    Enterprise services computing is the current trend for powerful large-scale information systems, which increasingly converge with cloud, computing environments. In this paper, the authors propose an original ontology-based Architecture Classification Framework for supporting cyclic architecture evaluations and optimizations of enterprise systems based on service-oriented architectures: ESARC - Enterprise Services Architecture...

    Provided By IARIA

  • White Papers // Jul 2012

    Adaptive OLAP Caching: Towards a Better Quality of Service in Analytical Systems

    Now-a-days, the use of multidimensional data systems has become a part of everyday actions in medium and large companies. These systems, which concern mainly in aiding their users in the process of decision-making, have a large flexibility in data exploration and high performance response levels to queries. Despite all the...

    Provided By IARIA

  • White Papers // Jul 2012

    Cultural Intelligence Decision Support System for Business Activities

    With the rapid growth of globalization, cross-cultural business activities are on the rise. These activities are of increasing importance for individuals and organizations. As a result, culture has become a decisive factor in the success of cross-cultural business. In today's global marketplace, individuals and organizations must be culturally intelligent. The...

    Provided By IARIA

  • White Papers // Jul 2012

    Using Business Process Simulation to Assess the Effect of Business Rules Automation

    Application of the business rules approach is often argued in research and practice to result in more efficient and enhanced processes. As the extent of this statement has yet to be shown, in this paper the process simulation method is applied to assess the effect of business rules externalization and...

    Provided By IARIA

  • White Papers // Jul 2012

    Towards a SLA-Compliant Cloud Resource Allocator for N-Tier Applications

    Cloud vendors commonly offer users IaaS where Virtual Machines (VMs) can be created and run on cloud resources. The resource allocation for each VM is defined by the user and the VM is created on a Physical Machine (PM) where ample resources exist to support the VM's operation at its...

    Provided By IARIA

  • White Papers // Jul 2012

    Enabling the Deployment of Virtual Clusters on the VCOC Experiment of the BonFIRE Federated Cloud

    The BonFIRE project has developed a federated cloud that supports experimentation and testing of innovative scenarios from the Internet of Services research community. Virtual Clusters On federated Cloud sites (VCOC) is one of the supported experiments of the BonFIRE Project whose main objective is to evaluate the feasibility of using...

    Provided By IARIA

  • White Papers // Jul 2012

    Pattern-Oriented Enterprise Architecture Management

    Current enterprise architecture frameworks are limited in their ability of providing reference architectures and architecture development methods to assist for developing comprehensive, guided and fully-fledged enterprise architectures. The outcome is that in the majority of cases present architecture modeling approaches are rarely validated, have sparse reference and meta-models as well...

    Provided By IARIA

  • White Papers // Jul 2012

    Pattern Innovation for Architecture Diagnostics in Services Computing

    Assessing the maturity of service-oriented enterprise software architectures is a problem since the current practice has been developed rather intuitively, providing only a sparse and rarely validated meta-model. In preliminary work, the authors have developed an original pattern language for supporting repetitive enterprise system architecture assessments. The aim is the...

    Provided By IARIA

  • White Papers // Jul 2012

    Advances in Protecting Remote Component Authentication

    Component authentication allows verifying the originality of various components being part of a machine or a system, or being connected to control equipment. Various technologies are available, ranging from holograms, hidden marks, and special inks to cryptography-based component authentication. Typical applied cryptography-based mechanisms employ a challenge-response-based component authentication mechanism. These...

    Provided By IARIA

  • White Papers // Jul 2012

    A Scalability Analysis of an Architecture for Countering Network-Centric Insider Threats

    Dealing with the insider threat in networked environments poses many challenges. Privileged users have great power over the systems they own in organizations. To mitigate the potential threat posed by insiders, the authors introduced in previous work a preliminary architecture for the Autonomic Violation Prevention System (AVPS), which is designed...

    Provided By IARIA

  • White Papers // Jul 2012

    Dependable Estimation of Downtime for Virtual Machine Live Migration

    Modern virtualization environments allow the live migration of running systems for load balancing and failover purposes in case of failing hosts. The overall duration of such migration and the short downtime during this process are essential properties when implementing service availability agreements. However, both metrics are currently only determinable through...

    Provided By IARIA

  • White Papers // Jul 2012

    Organizing Security Patterns Related to Security and Pattern Recognition Requirements

    Software security is an emerging area in software development. More and more vulnerabilities are published and highlight the endangerment of systems. Hence, software designers and programmers are increasingly faced with the need to apply security solutions to software systems. Security patterns are best practices to handle recurring security problems. The...

    Provided By IARIA

  • White Papers // Jul 2012

    Facilitating Bioinformatics Research Through a Mobile Cloud with Trusted Data Provenance

    Cloud provides a cheap yet reliable outsourcing model for anyone who needs scalable computing resources. Together with the cloud, Service Oriented Architecture (SOA) allows the construction of scientific workflows to bring together various scientific computing tools offered as services in the cloud, to answer complex research questions. In those scientific...

    Provided By IARIA

  • White Papers // Jul 2012

    Optimizing the Performance of a Dismounted Future Force Warrior by Means of Improved Situational Awareness

    The future operational settings involve a battlespace where warriors and commanders rely on SA-tools to perform optimally in their given tasks. This may include combat settings in Military Environment (ME) as well as counter insurgency actions, peace-keeping operations and operations in Crises Management Environment (CME). In multi-national operations taking place...

    Provided By IARIA

  • White Papers // Jul 2012

    Exploiting Model Variability in ABS to Verify Distributed Algorithms

    The authors show a way to evaluate functional properties of distributed algorithms by the example of the AODV algorithm in sensor networks, Creol and ABS models, and component testing. They present a new method to structure the evaluation work into the categories of techniques, perspectives, arrangements, and properties using executable...

    Provided By IARIA

  • White Papers // Jul 2012

    Impact of Scrambling-Exact Channel Estimation on HSDPA MIMO

    Multiple-Input Multiple-Output (MIMO) antenna systems require a separate pilot signal for each transmitting antenna for enabling the receiver to measure all physical channels separately. As scrambling operates with pseudorandom sequences the auto-correlation is quasi-orthogonal with small deviations from exact orthogonality. In this paper, the impact of these deviations is investigated,...

    Provided By IARIA

  • White Papers // Jul 2012

    Radiation Pattern Characteristics of Multiple Band-Notched Ultra Wideband Antenna With Asymmetry Slot Reconfiguration

    Radiation pattern characteristics of reconfigurable asymmetry slotted ultra wideband antenna with multiple band-notched are presented. The proposed antenna is planar monopole, consisting of a microstrip feed line and modified L and U slots with a pentagonal patch on the front side and half ground plane is on the back side...

    Provided By IARIA

  • White Papers // Jul 2012

    Effect of Global and Local Brightness on Quality of 3D and 2D Visual Perception

    There are several different factors that affect the perceived quality of 3D content. The authors' objective in this paper is to investigate how the global and local change of brightness in a scene will affect the overall 3D visual perception. Their work contains two studies: global change of brightness, which...

    Provided By IARIA

  • White Papers // Jul 2012

    Application of Scenario-Driven Role Engineering in Knowledge Management Systems - Requirements and Implementation

    Collaborative systems, which are often used in short-term virtual enterprises or long-term cooperation networks, often contain information about the manufacturing and fabrication competences of the participating technology partners. These should only be made available to a very restricted group of persons for example to support feasibility studies in the context...

    Provided By IARIA

  • White Papers // Jul 2012

    An XDI-Based Approach to Represent and Exchange Data Between Federated Clouds

    Cloud providers need to manage and control their assets identifying, retrieving, and exchanging data about their virtual resources in different operating contexts. These tasks are not trivial at all and this leads cloud providers to design proprietary solutions for the management of their virtual resources and services. In this paper,...

    Provided By IARIA

  • White Papers // Jul 2012

    A Privacy Preserving Solution for Webmail Systems With Searchable Encryption

    In this paper, the authors give an introduction to privacy issues in Cloud Computing and discuss the state of art in the privacy enhancing technologies that can be used for Cloud Computing. They focus on a Software as a Cloud scenario (webmail services) and propose a privacy preserving architecture in...

    Provided By IARIA

  • White Papers // Jul 2012

    Movement Synchronization for Improving File-Sharing Efficiency Using Bi-Directional Recursive Data-Replication in Vehicular P2P Systems

    Recent research in opportunistic networks addresses the diffusion policy and the practicality considerations in utilizing device-specific applications. Intermittent connectivity between mobile nodes and the random behavioral patterns of the users, make modeling and measuring the performance of opportunistic networks very challenging particularly in the case of file/object sharing among these...

    Provided By IARIA

  • White Papers // Jul 2012

    Wireless Networks With Retrials and Heterogeneous Servers : Comparing Random Server and Fastest Free Server Disciplines

    This paper proposes an algorithmic approach based on Generalized Stochastic Petri Nets, for modeling and analyzing finite-source wireless networks with retrial phenomenon and two servers' classes. The particularity of this approach is the direct computing of the infinitesimal generator of the proposed Generalized Stochastic Petri Net without generating neither the...

    Provided By IARIA

  • White Papers // Jul 2012

    Wireless Cooperative Relaying Based on Opportunistic Relay Selection

    Advances in wireless technologies, including more powerful devices and low cost radio technologies, have potential to drive an ubiquitous utilization of Internet services. Nevertheless wireless technologies face performance limitations due to unstable wireless conditions and mobility of devices. In face of multi-path propagation and low data rate stations, cooperative relaying...

    Provided By IARIA

  • White Papers // Jul 2012

    Community Telephone Networks in Africa - Bridging the Gap Between Poverty and Technology

    Many new cell phones on the market come with 802.11 enabled, along with standard Bluetooth functionality. A large percentage of working class people in South Africa typically cannot afford 802.11 enabled cell phones, and thus the most applicable form of wireless data transfer is achieved through the Bluetooth protocol. This...

    Provided By IARIA

  • White Papers // Jul 2012

    Performance Isolation Issues in Network Virtualization in Xen

    Resource virtualization has been known and used for a while as a mean of better hardware utilization and cost reduction. Recently, the idea of virtualization of networking resources has become of vital importance to networking community. Among other things, this is connected with the fact that the virtulization principle is...

    Provided By IARIA

  • White Papers // Jul 2011

    Merging Differential Updates in In-Memory Column Store

    To meet the performance requirements of enterprise application for both, transactional applications as well as analytical scenarios, data storage of in-memory databases are split into two parts: One optimized for reading and a write-optimized differential buffer. The read-optimized main storage together with the differential buffer for inserts provides the current...

    Provided By IARIA

  • White Papers // Jul 2013

    Optimal Query Operator Materialization Strategy for Hybrid Databases

    Recent research shows that main memory database system provides many different advantages over traditional disk based systems. Furthermore it is shown that the way how data is persisted in such a system is very important. Modern systems provide a hybrid row- and column-oriented storage layer that proves to be optimal...

    Provided By IARIA

  • White Papers // Jul 2013

    Ensembles of Decision Trees for Network Intrusion Detection Systems

    The paper discusses intrusion detection systems built using ensemble approaches, i.e., by combining several machine learning algorithms. The main idea is to exploit the strengths of each algorithm of the ensemble to obtain a robust classifier. Network attacks can be divided into four classes: probe, remote to local, denial of...

    Provided By IARIA

  • White Papers // Jul 2013

    Towards Enhanced Usability of IT Security Mechanisms: How to Design Usable IT Security Mechanisms Using the Example of Email Encryption

    Now-a-days, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the...

    Provided By IARIA

  • White Papers // Jul 2013

    Model-Based Design of Dependable Systems: Limitations and Evolution of Analysis and Verification Approaches

    Designing a dependable system successfully is a challenging issue that is an ongoing research subject in the literature. Different approaches have been adopted to analyze and verify the dependability of a system design. This process is far from obvious and often hampered due to the limitations of the classical dependability...

    Provided By IARIA

  • White Papers // Feb 2012

    Towards Next Generation Malware Collection and Analysis

    The fast paced evolution of malware has demonstrated severe limitations of traditional collection and analysis concepts. However, a majority of the anti-malware industry still relies on such ineffective concepts and invests much effort into temporarily fixing most obvious shortcomings. Ultimately fixing outdated concepts is insufficient for combating highly sophisticated future...

    Provided By IARIA

  • White Papers // Feb 2012

    A Case for Inverted Indices in In-Memory Databases

    Recent database research has focused on in-memory databases, which can be used in mixed workload scenarios, enabling OLTP and OLAP queries on the same database engine. These compressed column-oriented database systems use a differential store concept to enable fast inserting and require a merge process to compact the data periodically...

    Provided By IARIA

  • White Papers // Feb 2012

    Operating on Hierarchical Enterprise Data in an In-Memory Column Store

    Enterprise data management is currently separated into On-Line Transactional Processing (OLTP) and On-Line Analytical Processing (OLAP). This separation brings disadvantages such as the need for costly data replication, maintaining redundant systems or the inability to run data reports on the latest transactional data. Academia and industry are working on a...

    Provided By IARIA

  • White Papers // Feb 2012

    About Top-K Flexible Queries in Large Databases

    The problem of obtaining efficient answers to top k queries has attracted a lot of research attention. Unfortunately, current top-k query processing techniques focus on Boolean queries, and cannot be applied to the large Data Bases (DB) seen the gigantic number of data. In this paper, the authors propose a...

    Provided By IARIA

  • White Papers // Feb 2012

    A New Approach for Top-K Flexible Queries in Large Database Using the Knowledge Discovered

    In this paper, the authors propose their contribution to support top-k flexible query in large DB. Generally, the current top-k query processing techniques focus on Boolean queries, and cannot be applied to the large DB seen the gigantic number of data. Their approach proposes to uses the generated knowledge result...

    Provided By IARIA

  • White Papers // Feb 2012

    OLAP Authentication and Authorization via Query Re-Writing

    On-Line Analytical Processing (OLAP) has become an increasingly important and prevalent component of Decision Support Systems. OLAP is associated with a data model known as a cube, a multi-dimensional representation of the core measures and relationships within the associated organization. While numerous cube generation and processing algorithms have been presented...

    Provided By IARIA

  • White Papers // May 2013

    Eliciting Risk, Quality and Cost Aspects in Multi-Cloud Environments

    With the increasing number of providers offering cloud-based services, new opportunities arise to build applications capable of avoiding vendor lock-in issues. Such applications are developed in multi-cloud environments that allow replacing services with those offered by alternative providers. While this may improve quality and provide independence from a single cloud...

    Provided By IARIA

  • White Papers // Jul 2011

    Object Security and Verification for Integrated Information and Computing Systems

    This paper presents the results of the development of techniques for implementing communication for complex integrated information and computing systems based on object envelopes. This provides means for flexible information exchange, namely objects, in mission critical environments, based on verification methods and cryptography. It covers some challenges of collaborative implementation,...

    Provided By IARIA

  • White Papers // Sep 2012

    Towards an Agile E-Commerce

    Creating an agile e-commerce is still a challenging issue. The alignment between business and IT plays a key role as changing business demands must be implemented immediately. To avoid misunderstandings and to lead to a better business-IT alignment the authors provide an ontology model, describing enterprise objects and their relations....

    Provided By IARIA

  • White Papers // Oct 2011

    Implementation of Integrated Systems and Resources for Information and Computing

    This paper presents the practical results from the real-life implementation of interactive complex systems in specialized high end computing environments. The successful implementation has been made possible using a new concept of higher-level data structures for dynamical applications and configuration of the resources. The discussion shows how an implementation of...

    Provided By IARIA

  • White Papers // Oct 2012

    A Framework for Migrating Traditional Web Applications Into Multi-Tenant SaaS

    Software-as-a-Service (SaaS) is emerging as a new model of delivering a software, where users utilize software over the internet as a hosted service rather than an installable product. Multi-tenancy is a core concept in SaaS. It is the principle of running a single instance of the software on a server...

    Provided By IARIA

  • White Papers // Oct 2011

    Reasoning on High Performance Computing Resources an Urgent Computing Scenario

    The emergent growing amount of available information and data in the last decade has led to very large data stocks that express specific knowledge. This knowledge can be stored in ontologies. Reasoning strategies are then required to deal with a huge amount of data even if the allotted time frame...

    Provided By IARIA

  • White Papers // Mar 2012

    Resilience Issues for Application Workflows on Clouds

    Two areas are currently the focus of active research, namely cloud computing and high-performance computing. Their expected impact on business and scientific computing is such that most application areas are eagerly up taking or waiting for the associated infrastructures. However, open issues still remain. Resilience and load balancing are examples...

    Provided By IARIA

  • White Papers // Oct 2011

    Real-Time Processing and Archiving Strategies

    Today due to huge data growth, more digitization needs, mobile devices producing more data, faster supercomputer power, and applications, end user expect to store and archive their data in real-time and have continuously real-time access to that data. Keeping up with this fast growing demand of user behavior of \"Self-service\"...

    Provided By IARIA

  • White Papers // Jul 2011

    Automated Organizational Network Analysis for Enterprise 2.0

    Social networking sites have recently become a mainstream communications technology for many people around the world. Major IT vendors are releasing social software designed for use in a business/commercial context. These Enterprise 2.0 technologies have impressive collaboration and information sharing functionality, but so far they do not have any Organizational...

    Provided By IARIA

  • White Papers // Jan 2012

    Comparison of Stacking Methods Regarding Processing and Computing of Geoscientific Depth Data

    This paper presents a comparison of different stacking methods available for processing and computing of geo-scientific depth data for use with various high level applications and computing architectures. These methods are used with seismics and comparable geophysical techniques for example. Today's resources enable to use these methods for more than...

    Provided By IARIA

  • White Papers // May 2013

    CloudState: End-to-End WAN Monitoring for Cloud-Based Applications

    Modern data centres are increasingly moving towards more sophisticated cloud-based infrastructures, where servers are consolidated, backups are simplified and where resources can be scaled up, across distributed cloud sites, if necessary. Placing applications and data stores across sites has a cost, in terms of the hosting at a given site,...

    Provided By IARIA

  • White Papers // Oct 2012

    Cloud Applications Versus Web Applications: A Differential Study

    Cloud computing revolution started reshaping the entire ICT industry and adding new concepts; cloud application is one of these new concepts. This paper aims at differentiating between cloud applications and web applications and to position on the question \"What are the differences between cloud applications and web applications?\" The paper...

    Provided By IARIA

  • White Papers // May 2013

    Elastic-TOSCA: Supporting Elasticity of Cloud Application in TOSCA

    The Topology and Orchestration Specification for Cloud Applications (TOSCA) is an emerging framework aiming at enhancing the portability of cloud applications by standardizing their life cycle management in a vendor-neutral way. TOSCA captures the description of cloud application and infrastructure services, the relationships between parts of the services, and the...

    Provided By IARIA

  • White Papers // May 2013

    Using Patterns to Move the Application Data Layer to the Cloud

    Cloud services allow for hosting applications partially or completely in the Cloud by migrating their components and data. Especially with respect to data migration, a series of functional and non-functional challenges like data confidentiality arise when considering private and public Cloud data stores. In this paper, the authors identify some...

    Provided By IARIA

  • White Papers // Jul 2011

    Streaming Cloud Service Concept by Peer-to-Peer Distributed Technology

    In this paper, the authors discuss management manner for streaming services provided on complex network environment, and propose streaming management platform for realizing streaming cloud services, which doesn't depend peer environments. These streaming service-based applications would be expected to diffuse more greatly as the next generational services, and have been...

    Provided By IARIA

  • White Papers // May 2013

    A Cloud Platform to Support User-Provided Mobile Services

    The rapid evolution of mobile computing, together with the spread of social networks is increasingly moving the role of users from information and services consumers to actual producers. Currently, since most of the critical aspects related to user generated contents have been addressed, the main issues related to service generation...

    Provided By IARIA

  • White Papers // Jul 2011

    Evaluating an Open Source EXtensible Resource Identifier Naming System for Cloud Computing Environments

    Clouds are continuously changing environments where services can be composed with other ones in order to provide many types of other services to their users. In order to enable cloud platforms to manage and control their assets, they need to name, identify, and retrieve data about their virtual resources in...

    Provided By IARIA

  • White Papers // Jul 2011

    A Study of Dragon-Lab Federal Experiment Cloud and Network Contest

    Through the research and analysis on the contests of the IT organization management mode, operation platform and the trend of Network Contests (NC) development, the paper explores the issue about Dragon-lab federal experiment cloud and network contest environment construction, furthermore, it proposes a comprehensive solution for network contests layered management...

    Provided By IARIA

  • White Papers // Aug 2011

    Video Surveillance in the Cloud: Dependability Analysis

    Cloud computing with storage virtualization and new service-oriented architecture brings a new perspective to the aspect of dependability of video surveillance solutions and other safety-critical applications. The existing research is focused mainly on security challenges of cloud applications in general. The area of safety-critical systems is relatively unexplored especially beyond...

    Provided By IARIA

  • White Papers // Oct 2012

    Enabling Dynamical Use of Integrated Systems and Scientific Supercomputing Resources for Archaeological Information Systems

    This paper presents the results from combining Integrated Information and Computing System components with classification for the purpose of enabling multidisciplinary and dynamical use of information systems and supercomputing resources for Archaeological Information Systems. The essential base are a flexible collaboration framework, suitable long-term documentation, structuring and classification of objects,...

    Provided By IARIA

  • White Papers // Jul 2011

    Provisioning Service Differentiation for Virtualized Network Devices

    In order to efficiently utilize the network bandwidth and flexibly enable one or more networks to be combined or subdivided into virtual networks, it is essential to virtualize network devices and then to provide service differentiation for the virtualized network devices. In this paper, the authors propose a virtualizing method...

    Provided By IARIA

  • White Papers // Jul 2011

    Stateful or Stateless Flooding Attack Detection?

    SYN flooding attacks exploit the 3-way handshake characteristic of TCP connection setup to cause denials of service. Many techniques have been proposed for the detection of flooding attacks; most are stateless while a few are stateful. A stateful method keeps specific information on flows of packets while stateless methods will...

    Provided By IARIA

  • White Papers // Mar 2012

    A Formal Data Flow-Oriented Model for Distributed Network Security Conflicts Detection

    Network security is inherently a distributed function that involves the coordination of a set of devices, each device affording its specific security features. The complexity of this task resides in the number, the nature, and the interdependence of the mechanisms. Any security service can interfere with others creating a breach...

    Provided By IARIA

  • White Papers // Mar 2012

    Virtual Environment for Next Generation Sequencing Analysis

    Next Generation Sequencing technology, on the one hand, allows a more accurate analysis, and, on the other hand, increases the amount of data to process. A new protocol for sequencing the messenger RNA in a cell, known as RNASeq, generates millions of short sequence fragments in a single run. These...

    Provided By IARIA

  • White Papers // Mar 2012

    Utilizing a Risk-Driven Operational Security Assurance Methodology and Measurement Architecture - Experiences From a Case Study

    Practical measurement of information security of telecoms services is a remarkable challenge because of the lack of applicable generic tools and methods, the difficult to predict nature of security risks, the complexity of the systems and the low observability of security issues in them. The authors discuss their experiences in...

    Provided By IARIA

  • White Papers // Mar 2012

    A Relay-assisted Handover Pre-authentication Protocol in the LTE Advanced Network

    With the help of relaying, The Long Term Evolution Advanced network is improved on the coverage and capacity. But relaying concept brings many problems on handover management. In this paper, a relay node is introduced in the system structure. The authors extend the handover procedure to support relaying and transmit...

    Provided By IARIA

  • White Papers // Jul 2013

    A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents

    It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system's emergency response capabilities, alleviate the cyber attacks' damage, and strengthen the system's counterattack ability. A comprehensive early warning system is presented in this paper, which combines active measurement...

    Provided By IARIA

  • White Papers // Jul 2013

    Protecting the Communication Structure in Sensor Networks

    In the near future wireless sensor networks will be employed in a wide variety of applications establishing ubiquitous networks that will pervade society. The inherent vulnerability of these massively deployed networks to a multitude of threats, including physical tampering with nodes exacerbates concerns about privacy and security. For example, Denial...

    Provided By IARIA

  • White Papers // Jul 2013

    OSGiLarva: A Monitoring Framework Supporting OSGi's Dynamicity

    Service-oriented architecture is an approach where software systems are designed in terms of a composition of services. OSGi is a service-oriented framework dedicated to 24/7 Java systems. In this service-oriented programming approach, software is composed of services that may dynamically appear or disappear. In such a case, classical monitoring approaches...

    Provided By IARIA