ICST

Displaying 1-40 of 255 results

  • White Papers // May 2011

    Secure Distributed Lossless Compression With Side Information at the Eavesdropper

    This paper investigates the problem of secure distributed lossless compression in the presence of arbitrarily correlated side information at an eavesdropper. This scenario consists of two encoders (referred to as Alice and Charlie) that wish to reliably transmit their respective (correlated) sources to a legitimate receiver (referred to as Bob)...

    Provided By ICST

  • White Papers // May 2011

    The Jamming Game in an OFDM Setting

    Orthogonal Frequency Division Multiplexing (OFDM) has been chosen as the physical layer solution for a large variety of emerging and future wireless networks, due to its robustness in coping with frequency selective channels and efficient transceiver implementation. Its adoption in the transmission architecture should therefore be properly taken into account...

    Provided By ICST

  • White Papers // May 2011

    Relay and Jammer Cooperation as a Coalitional Game in Secure Cooperative Wireless Networks

    In this paper, the authors investigate cooperation of conventional relays and friendly jammers subject to secrecy constraints for cooperative networks. In order to obtain an optimized secrecy rate, the source selects several conventional relays and friendly jammers from the intermediate nodes to assist data transmission, and in return, it needs...

    Provided By ICST

  • White Papers // May 2011

    Automatic Protocol Signature Generation Framework for Deep Packet Inspection

    The authors present an automatic application protocol signature generating framework for Deep Packet Inspection (DPI) techniques with performance evaluation. They propose to utilize algorithms from the field of bioinformatics. They also present preprocessing methods to accelerate their system. Moreover, they developed several post-processing techniques to refine the accuracy of the...

    Provided By ICST

  • White Papers // Oct 2011

    Collaborative Authoring of Adaptive Learning Resources: Opportunities and Challenges

    One issue regarding adaptive learning systems is the provision of learning resources that consist of domain knowledge, pedagogical knowledge with adaptation rules, and learning content. Challenges emerge concerning the lack of usability, interoperability, efficiency and collaboration. This paper critically discusses an enhanced collaborative authoring approach to developing adaptive learning resources....

    Provided By ICST

  • White Papers // Sep 2011

    Supporting Mood Awareness in Collaborative Settings

    Affective aspects during collaboration can be exploited as triggers for reflection, yet current tools usually ignore these aspects. In this paper, the authors present a set of design choices to inform the design of systems towards enabling mood awareness in collaborative work settings like meetings or conferences. Design choices have...

    Provided By ICST

  • White Papers // Oct 2011

    Protocol for Mitigating the Risk of Hijacking Social Networking Sites

    The proliferation of social and collaborative media has been accompanied by an increased level of cyber attacks on social networking and collaboration sites. One serious type of attack is session hijacking attacks which enable the attacker to impersonate the victim and take over his/her networking session(s). In this paper, the...

    Provided By ICST

  • White Papers // Oct 2011

    Mitigating the Cognitive Overload of Contemporary Argumentation-Based Collaboration Settings

    Current advances in computing and Internet technologies, together with the advent of the Web 2.0 era, have resulted in the development of a plethora of online, publicly available environments such as blogs, discussion forums, wikis, and social networking applications. These offer people an unprecedented level of flexibility and convenience to...

    Provided By ICST

  • White Papers // Oct 2011

    Consistent Replication in Distributed Multi-Tier Architectures

    Replication is commonly used to address the scalability and availability requirements of collaborative web applications in domains such as computer supported cooperative work, social networking, e-commerce and e-banking. While providing substantial benefits, replication also introduces the overhead of maintaining data consistent among the replicated servers. In this paper, the authors...

    Provided By ICST

  • White Papers // Oct 2011

    On Data Provenance in Group-Centric Secure Collaboration

    In this paper, the authors explore data provenance in a group-centric secure collaboration environment. In collaborations, participating organizations are likely to want certain trustworthiness on the data that are shared from other organizations and some assurance on how the shared data are used by users regardless of their organizations. By...

    Provided By ICST

  • White Papers // Oct 2011

    REUSES: Questionnaire-Driven Design for the Automatic Generation of Web-Based Collaborative Applications

    In this paper, the authors present a questionnaire-driven collaborative design methodology for the automatic generation of collaborative applications. The methodology is based on a repository of collaborative components and a knowledge base of its application and use modes. The repository includes components built by the team, as well as third-party...

    Provided By ICST

  • White Papers // Oct 2011

    Featuring Automatic Adaptivity Through Workflow Enactment and Planning

    Process Management Systems (PMSs, a.k.a. Workflow Management Systems - WfMSs) are currently more and more used as a supporting tool to coordinate the enactment of processes. In real world scenarios, the environment may change in unexpected ways so as to prevent a process from being successfully carried out. In order...

    Provided By ICST

  • White Papers // Oct 2011

    Mobile XMPP and Cloud Service Collaboration: An Alliance for Flexible Disaster Management

    Recent crises like the Fukushima incident in Japan show that there is a demand for flexible and easy-to-use communication and sensor systems to support post-disaster management (i.e., the organization of actions in the follow-up of disasters), especially when critical infrastructure is affected. This paper introduces a system design that combines...

    Provided By ICST

  • White Papers // Oct 2011

    A Distributed Web Browser as a Platform for Running Collaborative Applications

    Most existing collaborative applications on the Web require centralized servers for storing shared data and relaying communication messages among browsers. This means that users of these applications must fully trust centralized servers that hold and relay potentially sensitive and important data. Furthermore, users can lose access to their data if...

    Provided By ICST

  • White Papers // Oct 2011

    A Trust-Based Approach to Mitigate Rerouting Attacks

    One of the ways a malicious router can launch a Denial of Service (DoS) attack is by rerouting IP-packets of other destinations to the victim node. In this paper, based on the observed traffic anomalies, the authors propose using a Markov chain model to calculate trustworthiness of routers in order...

    Provided By ICST

  • White Papers // Oct 2011

    A Test-Bed for the Evaluation of Business Process Prediction Techniques

    Business process prediction technologies are being increasingly used by organisations to provide timely feedback to their customers and improve their overall productivity. In order to provide valuable information to both customers and system managers, the timings of business processes need to be forecast with high accuracy and efficiency. In particular,...

    Provided By ICST

  • White Papers // Oct 2011

    Towards a Personalized Trust Architecture

    Advances in next generations distributed cyberspace technologies are expected to evolve a global cyberspace marketplace for resource and services. In marketplaces, particularly with the autonomy of users, trading parties differ in many respects, for example their declared agendas, honesty, owned or outsourced resources, and their products. Given these differences and...

    Provided By ICST

  • White Papers // Oct 2011

    Memory-Enabled Autonomic Resilient Networking

    It is becoming increasingly challenging for the contemporary Internet to satisfy the explosion in networking services and applications with their widely diverse and dynamic QoS requirements and resource demands. For smarter networking management and operations, they hypothesize that next generation networks should be endowed with "Memory"-like (i.e., functionally similar to...

    Provided By ICST

  • White Papers // Oct 2011

    Provenance for Collaboration: Detecting Suspicious Behaviors and Assessing Trust in Information

    Data collaborations allow users to draw upon diverse resources to solve complex problems. While collaborations enable a greater ability to manipulate data and services, they also create new security vulnerabilities. Collaboration participants need methods to detect suspicious behaviors (potentially caused by malicious insiders) and assess trust in information when it...

    Provided By ICST

  • White Papers // Oct 2011

    A Content-Aware Collaborative Accessing Model in Ad Hoc Networks

    Reducing the transmission cost is one of the most important issues in multi-hop ad-hoc networks. Considerable research has been done on efficient routing and data accessing algorithms. However, most previous research on routing schemes focus on topological structures, and not much attention has been made to data content distributions in...

    Provided By ICST

  • White Papers // Oct 2011

    An Exploratory Study on Open Conversation Spaces in Software Engineering

    Software engineering is by nature a highly collaborative activity and being able to collaborate effectively is a key factor for project success. However, collaborating effectively in Global Software Engineering, in which team members are geographically, temporally and socio-culturally separated from each other, is an important challenge. In a traditional co-located...

    Provided By ICST

  • White Papers // Oct 2011

    Data Management Support Via Spectrum Perturbation-Based Subspace Classification in Collaborative Environments

    Data management support to enable effective and efficient information sharing in collaborative environments is critical, especially in semantics based search and retrieval. In this paper, a novel spectrum perturbation-based subspace classification is proposed to mine semantics and other useful information from a large-scale dataset by utilizing a lower-dimensional subspace to...

    Provided By ICST

  • White Papers // Oct 2011

    Bootstrapping Operation-Level Web Service Ontology: A Bottom-Up Approach

    Ontology is the key ingredient of semantic Web service technologies, which support systematic management of Web services, such as automatic service discovery, service composition, and change management. It is crucial and challenging to reduce the human efforts for developing ontologies. The authors propose a bottom-up approach that bootstraps operation-level service...

    Provided By ICST

  • White Papers // Oct 2011

    Overhearing Conversations in Global Software Engineering - Requirements and an Implementation

    Conversations between colleagues in collaborative software engineering are important for coordinating work, sharing knowledge and creating knowledge. Overhearing conversations of others is useful as well since this: provides access to the information discussed in the conversations, offers the possibility of joining the conversations and provides insight in the communication structure...

    Provided By ICST

  • White Papers // Oct 2011

    The ABA Problem in Multicore Data Structures With Collaborating Operations

    An increasing number of modern real-time systems and the nowadays ubiquitous multicore architectures demand the application of programming techniques for reliable and efficient concurrent synchronization. Some recently developed Compare-And-Swap (CAS) based non-blocking techniques hold the promise of delivering practical and safer concurrency. The ABA2 problem is a fundamental problem to...

    Provided By ICST

  • White Papers // Oct 2011

    OTPM: Failure Handling in Data-Intensive Analytical Processing

    Parallel processing is the key to speedup performance and to achieve high throughput in processing large scale data analytical workloads. However, failures of nodes involved in the analytical query can interrupt the whole process, resulting in the complete restart of the query if the system does not have query fault-tolerance....

    Provided By ICST

  • White Papers // Oct 2011

    CONFLuEnCE: Implementation and Application Design

    Data streams have become pervasive and data production rates are increasing exponentially, driven by advances in technology, for example the proliferation of sensors, smart phones, and their applications. This fact effectuates an unprecedented opportunity to build real-time monitoring and analytics applications, which when used collaboratively and interactively, will provide insights...

    Provided By ICST

  • White Papers // Oct 2011

    DCDIDP: A Distributed, Collaborative, and Data-Driven Intrusion Detection and Prevention Framework for Cloud Computing Environments

    With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure...

    Provided By ICST

  • White Papers // Apr 2012

    The BCP: An Integrated Communication and Collaboration Platform for Biosecurity Research and Incident Response Workgroups

    The authors present the design and implementation of an advanced collaboration platform that integrates life-size video conferencing and group interactions with a large shared workspace. The platform was developed to support the diagnostics and research scientists who need to work collaboratively with others across a physical bio-containment barrier. The system...

    Provided By ICST

  • White Papers // Sep 2010

    Performance of Deterministic Local Sensing Aggregation Under Interference

    In this paper, the authors evaluate the delay and sensing performance of distributed cooperative sensing in wireless sensor networks assisting cognitive secondary operation. They propose a time division multiple access protocol to exchange sensing information among neighboring sensors, that is tunable in terms of sensing cooperation range and frequency reuse...

    Provided By ICST

  • White Papers // Sep 2010

    Blind Standard Identification With Bandwidth Shape and GI Recognition Using USRP Platforms and SDR4all Tools

    In this paper, focusing on identifying standards blindly, the authors propose a bandwidth shape sensor and a GI (guard interval) sensor using USRP (Universal Software Radio Peripheral) platforms and SDR4all tools. These sensors are fundamental parts of the so-called Blind Standard Recognition Sensor. The blind standard bandwidth sensor is based...

    Provided By ICST

  • White Papers // Sep 2010

    Standard Recognising Self Organizing Map Based Cognitive Radio Transceiver

    Cognitive Radio (CR) Systems have transceivers with the ability to adjust their operating parameters after observing the results in order to decide to operate in a specific radio configuration, expecting to move the radio towards some optimized operational state. Framed within this statement, this paper introduces and evaluates the use...

    Provided By ICST

  • White Papers // Sep 2010

    Multiple Description Source Coding for Cognitive Radio Systems

    Multiple Description Coding (MDC) is applied for delay-sensitive data traffic to alleviate interruptions caused by primary users in cognitive radio systems. For Gaussian source, a simplified algorithm for the exhaustive search of optimal distortions and rates is proposed based on the achievable region of coding rates and delay requirement. For...

    Provided By ICST

  • White Papers // Sep 2010

    SINR Balancing in the Downlink of Cognitive Radio Networks With Imperfect Channel Knowledge

    In this paper, the authors consider the problem of Signal-to-Interference-plus-Noise Ratio (SINR) balancing in the downlink of Cognitive Radio (CR) networks while simultaneously keeping interference levels at Primary User (PU) Receivers (RXs) below an acceptable threshold with uncertain channel state information available at the CR Base-Station (BS). They optimize the...

    Provided By ICST

  • White Papers // Apr 2010

    Broadcast Video Streaming in Cellular Networks: An Adaptation Framework for Channel, Video and AL-FEC Rates Allocation

    Video streaming is one of the most important applications that will make use of the high data rates offered by 4G networks. The current video transport techniques are already very advanced, and the more immediate problems lie in the joint optimization of video coding, AL-FEC, and PHY rate selection with...

    Provided By ICST

  • White Papers // Mar 2010

    Evaluation of IMT-Advanced Scenarios Using the Open Wireless Network Simulator

    With the commence of the IMT-Advanced (IMT-A) submission and evaluation process, the vague term "4th generation wireless networks" moves towards existing standards, technologies and hardware. A significant part of the evaluation process is based on the system level simulation of reference scenarios. In this paper, the authors present how the...

    Provided By ICST

  • White Papers // May 2011

    Mean Field Stochastic Games for SINR-Based Medium Access Control

    In this paper, the authors study medium access control with interference management. They formulate a SINR-based dynamic channel access as a stochastic game in which the players adapt their retransmission scheme based on their own backoff state. They analyze the asymptotics of the system using mean field dynamics. Both stable...

    Provided By ICST

  • White Papers // May 2011

    Graph-Based Coalitional Games - An Analysis Via Characteristics

    In this paper, the authors motivate a new approach to analyze the computational complexity of solution concepts and player-based properties, as well as other properties of coalitional games. This approach is based on the idea to abstract away from detailed game representations to analyze games via standard complexity proofs, towards...

    Provided By ICST

  • White Papers // May 2011

    The Price of Re-Establishing Perfect, Almost Perfect or Public Monitoring in Games With Arbitrary Monitoring

    This paper establishes a connection between the notion of observation (or monitoring) structure in game theory and the one of communication channels in Shannon theory. One of the objectives is to know under which conditions an arbitrary monitoring structure can be transformed into a more pertinent monitoring structure. To this...

    Provided By ICST

  • White Papers // May 2011

    Coopetition - Practical Methodology for Efficient Sharing of Radio Resources in Wireless Networks

    In this paper, the authors present the idea of resource allocation using the coopetition methodology, which combines the advantages of both cooperative and competitive approaches. This idea is known from economics, as well as in some other fields, e.g., in the complex production and management systems. They show that the...

    Provided By ICST