ICST

Displaying 1-40 of 239 results

  • White Papers // Oct 2011

    Overhearing Conversations in Global Software Engineering - Requirements and an Implementation

    Conversations between colleagues in collaborative software engineering are important for coordinating work, sharing knowledge and creating knowledge. Overhearing conversations of others is useful as well since this: provides access to the information discussed in the conversations, offers the possibility of joining the conversations and provides insight in the communication structure...

    Provided By ICST

  • White Papers // Oct 2011

    The ABA Problem in Multicore Data Structures With Collaborating Operations

    An increasing number of modern real-time systems and the nowadays ubiquitous multicore architectures demand the application of programming techniques for reliable and efficient concurrent synchronization. Some recently developed Compare-And-Swap (CAS) based non-blocking techniques hold the promise of delivering practical and safer concurrency. The ABA2 problem is a fundamental problem to...

    Provided By ICST

  • White Papers // Oct 2011

    OTPM: Failure Handling in Data-Intensive Analytical Processing

    Parallel processing is the key to speedup performance and to achieve high throughput in processing large scale data analytical workloads. However, failures of nodes involved in the analytical query can interrupt the whole process, resulting in the complete restart of the query if the system does not have query fault-tolerance....

    Provided By ICST

  • White Papers // Oct 2011

    CONFLuEnCE: Implementation and Application Design

    Data streams have become pervasive and data production rates are increasing exponentially, driven by advances in technology, for example the proliferation of sensors, smart phones, and their applications. This fact effectuates an unprecedented opportunity to build real-time monitoring and analytics applications, which when used collaboratively and interactively, will provide insights...

    Provided By ICST

  • White Papers // Oct 2011

    DCDIDP: A Distributed, Collaborative, and Data-Driven Intrusion Detection and Prevention Framework for Cloud Computing Environments

    With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure...

    Provided By ICST

  • White Papers // Apr 2012

    The BCP: An Integrated Communication and Collaboration Platform for Biosecurity Research and Incident Response Workgroups

    The authors present the design and implementation of an advanced collaboration platform that integrates life-size video conferencing and group interactions with a large shared workspace. The platform was developed to support the diagnostics and research scientists who need to work collaboratively with others across a physical bio-containment barrier. The system...

    Provided By ICST

  • White Papers // Sep 2010

    Performance of Deterministic Local Sensing Aggregation Under Interference

    In this paper, the authors evaluate the delay and sensing performance of distributed cooperative sensing in wireless sensor networks assisting cognitive secondary operation. They propose a time division multiple access protocol to exchange sensing information among neighboring sensors, that is tunable in terms of sensing cooperation range and frequency reuse...

    Provided By ICST

  • White Papers // Sep 2010

    Blind Standard Identification With Bandwidth Shape and GI Recognition Using USRP Platforms and SDR4all Tools

    In this paper, focusing on identifying standards blindly, the authors propose a bandwidth shape sensor and a GI (guard interval) sensor using USRP (Universal Software Radio Peripheral) platforms and SDR4all tools. These sensors are fundamental parts of the so-called Blind Standard Recognition Sensor. The blind standard bandwidth sensor is based...

    Provided By ICST

  • White Papers // Sep 2010

    Standard Recognising Self Organizing Map Based Cognitive Radio Transceiver

    Cognitive Radio (CR) Systems have transceivers with the ability to adjust their operating parameters after observing the results in order to decide to operate in a specific radio configuration, expecting to move the radio towards some optimized operational state. Framed within this statement, this paper introduces and evaluates the use...

    Provided By ICST

  • White Papers // Sep 2010

    Multiple Description Source Coding for Cognitive Radio Systems

    Multiple Description Coding (MDC) is applied for delay-sensitive data traffic to alleviate interruptions caused by primary users in cognitive radio systems. For Gaussian source, a simplified algorithm for the exhaustive search of optimal distortions and rates is proposed based on the achievable region of coding rates and delay requirement. For...

    Provided By ICST

  • White Papers // Sep 2010

    SINR Balancing in the Downlink of Cognitive Radio Networks With Imperfect Channel Knowledge

    In this paper, the authors consider the problem of Signal-to-Interference-plus-Noise Ratio (SINR) balancing in the downlink of Cognitive Radio (CR) networks while simultaneously keeping interference levels at Primary User (PU) Receivers (RXs) below an acceptable threshold with uncertain channel state information available at the CR Base-Station (BS). They optimize the...

    Provided By ICST

  • White Papers // Apr 2010

    Broadcast Video Streaming in Cellular Networks: An Adaptation Framework for Channel, Video and AL-FEC Rates Allocation

    Video streaming is one of the most important applications that will make use of the high data rates offered by 4G networks. The current video transport techniques are already very advanced, and the more immediate problems lie in the joint optimization of video coding, AL-FEC, and PHY rate selection with...

    Provided By ICST

  • White Papers // Mar 2010

    Evaluation of IMT-Advanced Scenarios Using the Open Wireless Network Simulator

    With the commence of the IMT-Advanced (IMT-A) submission and evaluation process, the vague term "4th generation wireless networks" moves towards existing standards, technologies and hardware. A significant part of the evaluation process is based on the system level simulation of reference scenarios. In this paper, the authors present how the...

    Provided By ICST

  • White Papers // Oct 2011

    REUSES: Questionnaire-Driven Design for the Automatic Generation of Web-Based Collaborative Applications

    In this paper, the authors present a questionnaire-driven collaborative design methodology for the automatic generation of collaborative applications. The methodology is based on a repository of collaborative components and a knowledge base of its application and use modes. The repository includes components built by the team, as well as third-party...

    Provided By ICST

  • White Papers // Oct 2011

    Featuring Automatic Adaptivity Through Workflow Enactment and Planning

    Process Management Systems (PMSs, a.k.a. Workflow Management Systems - WfMSs) are currently more and more used as a supporting tool to coordinate the enactment of processes. In real world scenarios, the environment may change in unexpected ways so as to prevent a process from being successfully carried out. In order...

    Provided By ICST

  • White Papers // Oct 2011

    Mobile XMPP and Cloud Service Collaboration: An Alliance for Flexible Disaster Management

    Recent crises like the Fukushima incident in Japan show that there is a demand for flexible and easy-to-use communication and sensor systems to support post-disaster management (i.e., the organization of actions in the follow-up of disasters), especially when critical infrastructure is affected. This paper introduces a system design that combines...

    Provided By ICST

  • White Papers // Oct 2011

    A Distributed Web Browser as a Platform for Running Collaborative Applications

    Most existing collaborative applications on the Web require centralized servers for storing shared data and relaying communication messages among browsers. This means that users of these applications must fully trust centralized servers that hold and relay potentially sensitive and important data. Furthermore, users can lose access to their data if...

    Provided By ICST

  • White Papers // Oct 2011

    A Trust-Based Approach to Mitigate Rerouting Attacks

    One of the ways a malicious router can launch a Denial of Service (DoS) attack is by rerouting IP-packets of other destinations to the victim node. In this paper, based on the observed traffic anomalies, the authors propose using a Markov chain model to calculate trustworthiness of routers in order...

    Provided By ICST

  • White Papers // Oct 2011

    A Test-Bed for the Evaluation of Business Process Prediction Techniques

    Business process prediction technologies are being increasingly used by organisations to provide timely feedback to their customers and improve their overall productivity. In order to provide valuable information to both customers and system managers, the timings of business processes need to be forecast with high accuracy and efficiency. In particular,...

    Provided By ICST

  • White Papers // Oct 2011

    Towards a Personalized Trust Architecture

    Advances in next generations distributed cyberspace technologies are expected to evolve a global cyberspace marketplace for resource and services. In marketplaces, particularly with the autonomy of users, trading parties differ in many respects, for example their declared agendas, honesty, owned or outsourced resources, and their products. Given these differences and...

    Provided By ICST

  • White Papers // Oct 2011

    Memory-Enabled Autonomic Resilient Networking

    It is becoming increasingly challenging for the contemporary Internet to satisfy the explosion in networking services and applications with their widely diverse and dynamic QoS requirements and resource demands. For smarter networking management and operations, they hypothesize that next generation networks should be endowed with "Memory"-like (i.e., functionally similar to...

    Provided By ICST

  • White Papers // Oct 2011

    Provenance for Collaboration: Detecting Suspicious Behaviors and Assessing Trust in Information

    Data collaborations allow users to draw upon diverse resources to solve complex problems. While collaborations enable a greater ability to manipulate data and services, they also create new security vulnerabilities. Collaboration participants need methods to detect suspicious behaviors (potentially caused by malicious insiders) and assess trust in information when it...

    Provided By ICST

  • White Papers // Oct 2011

    A Content-Aware Collaborative Accessing Model in Ad Hoc Networks

    Reducing the transmission cost is one of the most important issues in multi-hop ad-hoc networks. Considerable research has been done on efficient routing and data accessing algorithms. However, most previous research on routing schemes focus on topological structures, and not much attention has been made to data content distributions in...

    Provided By ICST

  • White Papers // Oct 2011

    An Exploratory Study on Open Conversation Spaces in Software Engineering

    Software engineering is by nature a highly collaborative activity and being able to collaborate effectively is a key factor for project success. However, collaborating effectively in Global Software Engineering, in which team members are geographically, temporally and socio-culturally separated from each other, is an important challenge. In a traditional co-located...

    Provided By ICST

  • White Papers // Oct 2011

    Data Management Support Via Spectrum Perturbation-Based Subspace Classification in Collaborative Environments

    Data management support to enable effective and efficient information sharing in collaborative environments is critical, especially in semantics based search and retrieval. In this paper, a novel spectrum perturbation-based subspace classification is proposed to mine semantics and other useful information from a large-scale dataset by utilizing a lower-dimensional subspace to...

    Provided By ICST

  • White Papers // Oct 2011

    Bootstrapping Operation-Level Web Service Ontology: A Bottom-Up Approach

    Ontology is the key ingredient of semantic Web service technologies, which support systematic management of Web services, such as automatic service discovery, service composition, and change management. It is crucial and challenging to reduce the human efforts for developing ontologies. The authors propose a bottom-up approach that bootstraps operation-level service...

    Provided By ICST

  • White Papers // Oct 2009

    Estimating Service Resource Consumption From Response Time Measurements

    The authors propose a linear regression method and a maximum likelihood technique for estimating the service demands of requests based on measurement of their response times instead of their CPU utilization. Their approach does not require server instrumentation or sampling, thus simplifying the parameterization of performance models. The benefit of...

    Provided By ICST

  • White Papers // Mar 2012

    SST + Gem5 = a Scalable Simulation Infrastructure for High Performance Computing

    High Performance Computing (HPC) faces new challenges in scalability, performance, reliability, and power consumption. Solving these challenges will require radically new hardware and software approaches. It is impractical to explore this vast design space without detailed system-level simulations. However, most of the existing simulators are either not sufficiently detailed, not...

    Provided By ICST

  • White Papers // Oct 2009

    Using Bulk Arrivals to Model I/O Request Response Time Distributions in Zoned Disks and RAID systems

    Useful analytical models of storage system performance must support the characteristics exhibited by real I/O workloads. Two essential features are the ability to cater for bursty arrival streams and to support a given distribution of I/O request size. This paper develops and applies the theory of bulk arrivals in queuing...

    Provided By ICST

  • White Papers // May 2011

    A Framework for Optimization Under Limited Information

    In many real world problems, optimization decisions have to be made often with limited information. The decision maker may have no a priori data about the (non-convex) objective function except from on a limited number of points that are obtained over time through costly observations. This paper presents an optimization...

    Provided By ICST

  • White Papers // May 2012

    QBD Sensitivity Analysis Tool Using Discrete-Event Simulation and Extension of SMCSolver

    The authors propose a tool that provides both analytical and simulation based performance analysis of both homogeneous and inhomogeneous Quasi-Birth-and-Death (QBD) processes. They extend SMCSolvers in order to study inhomogeneous case and to analyze first passage times. Simulations are performed on a discrete-event based approach. They also provide a rich...

    Provided By ICST

  • White Papers // May 2011

    Modeling Quantitative Requirements in SLAs With Network Calculus

    When planning Service-Oriented Architectures requirements declared in Service Level Agreements (SLAs) have to be considered. SLAs cover functional as well as quantitative requirements like load levels, services rates and delay times. As external factors can influence distributed systems, SLAs have to include tolerances for quantitative requirements. Early design phases of...

    Provided By ICST

  • White Papers // May 2011

    Centrality Maps and the Analysis of City Street Networks

    Firstly introduced in social science, the notion of centrality has spread to the whole complex network science. A centrality is a measure that quantifies whether an element of a network is well served or not, easy to reach, necessary to cross. This paper focuses on cities' street network (seen as...

    Provided By ICST

  • White Papers // May 2011

    Optimal Base Station Placement: A Stochastic Method Using Interference Gradient in Downlink Case

    In this paper, the authors study the optimal placement and optimal number of base stations added to an existing wireless data network through the interference gradient method. This proposed method considers a sub-region of the existing wireless data network, hereafter called region of interest. In this region, the provider wants...

    Provided By ICST

  • White Papers // May 2011

    Large-Deviations Analysis for Energy-Saving Mechanisms in Wireless Networks

    In wireless telecommunication networks, there is a strong interest in energy efficiency. Sleep-mode mechanisms, which temporarily switch off mobile devices or base stations, are popular means to attain this goal. The authors look at the performance of different sleep-mode mechanisms with large-deviations tools. These allow one to look at a...

    Provided By ICST

  • White Papers // May 2011

    More About Base Station Location Games

    This paper addresses the problem of locating base stations in a certain area which is highly populated by mobile stations; each mobile station is assumed to select the closest base station. Base stations are modeled by players who choose their best location for maximizing their uplink throughput. The approach of...

    Provided By ICST

  • White Papers // May 2011

    HS-Measure : A Hybrid Clustering Validity Measure to Interpret Road Traffic Data

    Clustering validity measures aim to evaluate the goodness of clustering results in order to find the best partition. Results are obtained by varying the input parameters values. However, sometimes, the values generated by these measures are very close and the choice of the optimal value associated to the best partition...

    Provided By ICST

  • White Papers // May 2011

    Throughput and QoS Pricing in Wireless Communication

    In this paper, the authors investigate a bi-level economic model of wireless communications. They take into account the user's demand and also the QoS offered by the network. They determine with their model when a provider can make more pro t by investing into new technology. They consider a Stackelberg...

    Provided By ICST

  • White Papers // May 2011

    Uplink Power Control and Subcarrier Assignment for an OFDMA Multicellular Network Based on Game Theory

    This paper proposes an energy-efficient game-theoretic approach to the issue of resource allocation for the uplink of a multi-cellular OFDMA network. The problem is decoupled into subcarrier assignment and power control, assuming the data rates to be fixed for all subcarriers and all terminals in the network. To capture the...

    Provided By ICST

  • White Papers // May 2011

    A Positioning of Cooperative Differential Games

    In this paper, the authors embed the theory of cooperative differential games within the theory of dynamic games and discuss a number of results of them. Dynamic game theory brings together four features that are key to many situations in economy, ecology, and elsewhere: optimizing behavior, presence of multiple agents/players,...

    Provided By ICST