Inderscience Enterprises

Displaying 1-40 of 106 results

  • White Papers // Jul 2014

    Efficient Online Memory Error Assessment and Circumvention for Linux with RAMpage

    Memory errors are a major source of reliability problems in computer systems. Undetected errors may result in program termination or, even worse, silent data corruption. Recent papers have shown that the frequency of permanent memory errors is an order of magnitude higher than previously assumed and regularly affects every day...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2014

    Compiling Irregular Applications for Reconfigurable Systems

    Algorithms that exhibit irregular memory access patterns are known to show poor performance on multiprocessor architectures, particularly when memory access latency is variable. Many common data structures, including graphs, trees, and linked-lists, exhibit these irregular memory access patterns. While FPGA-based code accelerators have been successful on applications with regular memory...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2013

    ChronoSym: A New Approach for Fast and Accurate SoC Cosimulation

    The early validation of modern SoC is not anymore feasible using traditional cycle-accurate cosimulations. These are based on the concurrent execution between SW running on multiple Instruction Set Simulators and HW simulators. The challenge is then speeding-up the simulation, without sacrificing the accuracy of traditional methods. The key contribution of...

    Provided By Inderscience Enterprises

  • White Papers // Jul 2013

    A Rough Set-Based Effective Rule Generation Method for Classification With an Application in Intrusion Detection

    In this paper, the authors use Rough Set Theory (RST) to address the important problem of generating decision rules for data mining. In particular, they propose a rough set-based approach to mine rules from inconsistent data. It computes the lower and upper approximations for each concept, and then builds concise...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2013

    A PLCS Framework for PDM/ERP Interoperabilty

    Wide diffusion of methodologies and software relevant to Product Lifecycle Management (PLM) in industrial companies faces heterogeneity of Information Technology (IT) systems. Especially, the lack of interoperability between Product Data Management (PDM) systems, that drive virtual product development, and Enterprise Resource Planning (ERP), which manages real product, cannot lead to...

    Provided By Inderscience Enterprises

  • White Papers // Nov 2012

    Authenticating Strangers in Online Social Networks

    In current Online Social Networks (OSNs), it is necessary for a user to determine whether a claimed public key belongs to a target user. In this paper, the authors design a system to complete this task. They first find a common friend between two users and let her help to...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2012

    A Framework for Integrating IT Governance and Business/IT Alignment Principles

    Highly information-intensive organizations such as retail banks continuously struggle with the key issues of controlling their IT-value and achieving business-IT alignment. One main reason might be that decision makers in retail banks do not use methods to plan or improve their business-IT alignment. This paper provides such a method, combining...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2012

    Data Contracts for Cloud-based Data Marketplaces

    Currently, rich and diverse data types have been increasingly provided using the Data-as-a-Service (DaaS) model, a form of cloud computing services and the core element of data marketplaces. This facilitates the on-the-fly data composition and utilization for several data-intensive applications in e-science and business domains. However, data offered by DaaS...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2012

    Many-to-One Communication Protocol for Wireless Sensor Networks

    This paper proposes a novel communication protocol, called Many-to-One Sensors-to-Sink (MOSS), tailored to Wireless Sensor Networks (WSNs). It exploits the unique sensors-to-sink traffic pattern to realize low-overhead medium access and low-latency sensors-to-sink routing paths. In conventional schedule-based MAC protocols such as S-MAC, sensor nodes in the proximity of the event...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2012

    Hierarchical DWT-Based Optimal Diversity Power Allocation for Video Transmission in OFDMA/MIMO Wireless Systems

    In this paper, the authors propose novel algorithms for optimal power allocation towards video transmission in Orthogonal Frequency Division Multiple Access (OFDMA) and Multiple-Input Multiple-Output (MIMO)-based 4G networks. A unique feature of the schemes is that they employ diversity dependent subcarrier power distribution relying on a Discrete Wavelet Transform (DWT)-based...

    Provided By Inderscience Enterprises

  • White Papers // May 2012

    Energy-Efficient Transmission and Bit Allocation Schemes in Wireless Sensor Networks

    Energy-efficient transmission and bit allocation schemes are investigated in multisource single-sink Wireless Sensor Networks (WSNs). For transmission over Additive White Gaussian Noise (AWGN) channels with path loss, this work shows that the overall energy consumption can be minimised if each sensor transmits with the minimum power and cooperates with others...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2012

    OpenMPC: Extended OpenMP for Efficient Programming and Tuning on GPUs

    General-Purpose Graphics Processing Units (GPGPUs) provide inexpensive, high performance platforms for compute-intensive applications. However, their programming complexity poses a significant challenge to developers. Even though the CUDA (Compute Unified Device Architecture) programming model offers better abstraction, developing efficient GPGPU code is still complex and error-prone. This paper proposes a directive-based,...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2012

    Local Key Management in Opportunistic Networks

    Opportunistic networks are a new and specific type of mobile peer-to-peer networks where end-to-end connectivity cannot be assumed. These networks present compelling challenges, especially from a security perspective, as interactive protocols are infeasible in such environments. In this paper, the authors focus on the problem of key management in the...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2012

    Process-Driven Biometric Identification by Means of Autonomic Grid Components

    Today's business applications are increasingly process driven, meaning that the main application logic is executed by a dedicate process engine. In addition, component-oriented software development has been attracting attention for building complex distributed applications. In this paper, the authors present the experiences gained from building a process-driven biometric identification application...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Designing a Flexible and Low-Cost Testbed for Wireless Sensor Networks

    Setting up a Wireless Sensor Network (WSN) for an experiment is both time consuming and effort intensive. Many testbeds connect and manage experimental nodes using wires and gateways. It leads to extra cost, extensive setup and maintenance effort and dedicated deployment place. The authors propose a framework for implementing a...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    A Source Authentication Scheme Using Network Coding

    In this paper, the authors explore the security merits of network coding and potential trade-offs with the widely accepted throughput benefits, especially in multicast scenarios. In particular, they propose a novel Source Authentication using Network Coding (SANC) scheme. Towards this objective, they propose a general framework for embedding the authentication...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Friendship-Based Location Privacy in Mobile Social Networks

    Location privacy in Mobile Social Networks (MSNs) has generated significant interest in recent years, with many proposed methods to address the problem. Commercial solutions to this problem have suggested designing better ways for users to determine when to report their locations, while academic researchers have proposed solutions that involve deploying...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Integrated Service Engineering Workbench: Service Engineering for Digital Ecosystems

    The evolution of service-oriented architectures towards digital ecosystems comprehends a number of challenges. One challenge is to develop services in a dynamic environment with high uncertainties and in collaboration with other companies. Another challenge lies in how to describe services sufficiently for trading them in digital ecosystems. This paper explores...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Syntax Vs. Semantics: Competing Approaches to Dynamic Network Intrusion Detection

    In this paper, the authors have described both syntax-based and semantic based approaches for dynamic network intrusion detection. For syntax-based approaches, they evaluated a fixed-partition and variable-length partition sliding-window scheme for automatic worm generation. Their results indicate that the variable length partition scheme is more flexible and can handle several...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2011

    Detection and Prevention of Botnets and Malware in an Enterprise Network

    One of the most significant threats faced by enterprise networks today is from Bots. A Bot is a program that operates as an agent for a user and runs automated tasks over the internet, at a much higher rate than would be possible for a human alone. A collection of...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2011

    A Rule-Based Approach to Model and Verify Flexible Business Processes

    Efficient organizations need to ensure that their business processes are flexible so that these processes can easily accommodate changes in regulations and policies. Appropriate techniques to model and verify these processes are required. In this paper, the authors present a rule-based approach, which is built upon the Event-Condition-Action model (ECA)...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2011

    Name-Based View Integration for Enhancing The Reusability in Process-Driven SOAs

    Many companies opt for reusing existing software development artefacts due to the benefits of the reuse such as increasing productivity, shortening time-to-market, and spending less time for testing, debugging, to name but a few. Unfortunately, reusing artefacts in existing process-driven SOA technologies is cumbersome and hard to achieve due to...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2011

    Reliable Congestion-Aware Information Transport in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) constitute the transportation conduit for the results of the in-network processing of the raw data. In WSNs the sensor node and communication level perturbations are often the norm than the exception due to varied environmental conditions. Consequently, the diverse applications supported by WSNs stipulate their individual...

    Provided By Inderscience Enterprises

  • White Papers // May 2011

    Asymptotic Scalability Analysis of Mobility Protocols Based on Signalling Overhead

    Increasing demand for mobility in wireless data networks has given rise to various mobility management protocols. The protocols use signaling messages to maintain reachability of mobile nodes. Increase in the number of mobile nodes gives rise to the scalability issues that need to be dealt with to avoid performance degradation...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2011

    Rendezvous Based Trust Propagation to Enhance Distributed Network Security

    Development of network of nodes connected with their trust values and the propagation of these trust values to far away nodes are basic operations of the modern day trustworthy networks. Trust can be exploited to mitigate the security threats in wireless network. Most of the existing trust propagation methods are...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2011

    Enhancing Lifetime of Wireless Sensor Networks Using Multiple Data Sinks

    In this paper, the authors address the fundamental question concerning the limits on the network lifetime in sensor networks when multiple Base Stations (BSs) are deployed as data sinks. Specifically, they derive upper bounds on the network lifetime when multiple BSs are employed, and obtain optimum locations of the base...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2011

    Towards Modelling the Impact of Cyber Attacks on a Smart Grid

    This paper provides an introduction to cyber attack impact analysis in the smart grid and highlights existing research in the field. The authors present an impact analysis framework where they focus on the model synthesis stage where both cyber and physical grid entity relationships are modelled as directed graphs. Each...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2011

    Mobile Multimedia in Wireless Sensor Networks

    One of the most referred and promising Wireless Sensor Network (WSN) applications is health monitoring. The small size and portability of nodes have made WSNs the perfect tool to easily monitor a person's health condition. In this type application, as well as in several other critical applications, reliability and mobility...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2011

    Success Guaranteed Routing in Almost Delaunay Planar Nets for Wireless Sensor Communication

    This paper proposes a routing strategy for wireless sensor networks that is valid even when the sensor nodes are distributed non-uniformly. Energy efficiency is the most important consideration in wireless sensor networks; hence, global communication should be achieved by combinations of local messages. The authors first propose a new underlying...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2011

    Future Wireless Networks: Key Issues and a Survey (ID/Locator Split Perspective)

    Future Wireless Networks (FWNs) are expected to be a convergence of different kinds of wireless technologies, such as cellular technologies, Wireless Local Area Networks (WLANs), wireless metropolitan area networks, wireless sensor networks, and traditional wired networks. Although users and/or customers will be oblivious to the specific underlying network being used...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2011

    A Networks-on-Chip Emulation/Verification Framework

    The emulation and functional validation are essential to the assessment of the correctness and performance of networks-on-chip architecture. A flexible hardware/software Network-on-Chip Open Platform (NoCOP) emulation framework is designed and implemented for exploring the on-chip interconnection network architectures. An instruction set simulator and universal serial bus communicator control and configure...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2010

    An Interference and Load Aware Routing Metric for Wireless Mesh Networks

    This paper proposes a load and interference-aware routing metric for wireless mesh networks, named Channel Utilisation and Contention Window Based (C2WB) metric. The authors' metric assigns weights to individual links which are proportional to the links service times estimated from both channel utilisation and the average contention window of the...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2010

    Caching Personalised and Database-Related Dynamic Web Pages

    In recent years, web development is the most important application in internet. Caching related technique improves the web server performance significantly. However, existing caching schemes cannot deal with the dynamic web pages efficiently. Thus, in this paper, the authors propose a caching scheme and then use web session objects and...

    Provided By Inderscience Enterprises

  • White Papers // Nov 2010

    A Survey on RFID Security and Provably Secure Grouping-Proof Protocols

    RFID security is a relatively new research area. Within less than a decade, a large number of research papers dealing with security issues of RFID technology have appeared. In the first part of this paper, the authors attempt to summarise current research in the field of RFID security and discuss...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2010

    Virtual ID: ID/Locator Split in a Mobile IP Environment for Mobility, Multihoming and Location Privacy for the Next Generation Wireless Networks

    Current networking protocols designed around single interface stationary end-systems clearly fail to represent the present communication context of mobile, multi-interface end-systems. Also, the convergence of wired and wireless technologies into an All-IP (AIP) next generation network will make available multiple diversified contexts that can be leveraged for better fault tolerance,...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2010

    Developing a Lean Design for Six Sigma Through Supply Chain Methodology

    The Six-Sigma systems can promote the enterprise competitive ability, such as pursuing cost improvement, promoting quality, the customer's satisfaction and valid strategy performance. This paper explored the synergies resulting from the combination of state-of-the art quality initiatives, lean and design for Six Sigma, and develop an integrated SCOR with lean...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2010

    The Impact of Virtualization on the Performance and Operational Costs of Massively Multiplayer Online Games

    Today's highly successful Massively Multiplayer Online Games (MMOGs) have millions of registered users and hundreds of thousands of active concurrent players. Motivated by performance and portability, MMOG operators currently pre-provision and then maintain throughout the lifetime of the game tens of thousands of compute resources in data centers located across...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2010

    Wireless Sensor Networks for Soil Science

    Wireless sensor networks can revolutionize soil ecology by providing measurements at temporal and spatial granularities previously impossible. This paper presents the authors' first steps towards fulfilling that goal by developing and deploying two experimental soil monitoring networks at urban forests in Baltimore, MD. The nodes of these networks periodically measure...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2010

    An Overview of Achieving Energy Efficiency in On-Chip Networks

    Energy efficient NoC design is necessary to optimise power consumption at SoCs and CMPs. Energy efficiency can be achieved through careful optimisation at different levels, such as component, circuit, and architectural level. This paper reviewed different techniques and tools to achieve energy efficiency at each of the aforementioned levels. Adopting...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2010

    A Cross-Layer Protocol for Cooperative Content Delivery Over Mobile Ad-Hoc Networks

    Real-time multimedia streaming over MANETs is an active research field since this technology promises scalable and robust audio/video delivery without infrastructure. Even though this problem has several commune features with peer-to-peer routing, the additional sensible parameters of MANETs make wired solutions unfit to this case; therefore, the authors propose a...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2009

    Standards for Security Associations in Personal Networks: A Comparative Analysis

    Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. It is particularly challenging to make this process of associating devices easy-to-use, secure and inexpensive at the same time. A cornerstone of this process is key...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2009

    Learning Under Pressure: Learning Strategies, Workplace Climate, And Leadership Style In The Hospitality Industry

    In this paper, the authors explored the relationship among learning strategies, leadership style, and work environment for middle managers in the hospitality industry. They found an association between learning strategy and workplace climate; they also found an association with leadership style, but to a lesser extent. In the hospitality industry,...

    Provided By Inderscience Enterprises

  • White Papers // Jul 2009

    Structuring Dyadic Relationships Between Export Producers And Intermediaries

    How do export producers and intermediaries structure their dyadic relationships? This paper examines the factors that guide the behaviour and relationships between export producer and intermediary dyads. The authors examine both sides of a dyadic transaction and develop an export producer - intermediary behaviour typology by using a grounded theory...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2011

    Rendezvous Based Trust Propagation to Enhance Distributed Network Security

    Development of network of nodes connected with their trust values and the propagation of these trust values to far away nodes are basic operations of the modern day trustworthy networks. Trust can be exploited to mitigate the security threats in wireless network. Most of the existing trust propagation methods are...

    Provided By Inderscience Enterprises

  • White Papers // May 2009

    Cognitive Networking of Large Scale Wireless Systems

    The authors propose the concept of cognitive networking for large-scale wireless systems, which opportunistically utilises network resources including both spectrum bandwidth and radio availability. Both types of resources cannot be predetermined in large-scale wireless systems, due to various reasons such as interferences and dynamic traffic load. The proposed technology not...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2009

    Longitudinal Knowledge Strategizing In A Long-Term Healthcare Organisation

    Long-term healthcare organisations significantly benefit from Knowledge Management (KM). However, the extant literature has little empirical support for this statement. Using the KM instrument developed by Bontis and Fitz-enz (2002), this paper extends prior studies by evaluating behaviours within a not-for-profit context over several years. As such, it tests a...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2010

    Indoor GPS: System Functionality and Initial Performance Evaluation

    Indoor GPS (IGPS) is a newly developed laser based measuring system for large scale metrology. The relative portability, reconfigurability and ease of installation make the IGPS suitable for many industries manufacturing large scale products. The system performance depends on both the components characteristics and their physical configuration. Hence, an important...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2010

    Wireless Sensor Networks for Soil Science

    Wireless sensor networks can revolutionize soil ecology by providing measurements at temporal and spatial granularities previously impossible. This paper presents the authors' first steps towards fulfilling that goal by developing and deploying two experimental soil monitoring networks at urban forests in Baltimore, MD. The nodes of these networks periodically measure...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2011

    Mobile Multimedia in Wireless Sensor Networks

    One of the most referred and promising Wireless Sensor Network (WSN) applications is health monitoring. The small size and portability of nodes have made WSNs the perfect tool to easily monitor a person's health condition. In this type application, as well as in several other critical applications, reliability and mobility...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2011

    Reliable Congestion-Aware Information Transport in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) constitute the transportation conduit for the results of the in-network processing of the raw data. In WSNs the sensor node and communication level perturbations are often the norm than the exception due to varied environmental conditions. Consequently, the diverse applications supported by WSNs stipulate their individual...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2010

    Efficient Predictive Monitoring of Wireless Sensor Networks

    Wireless Sensor Networks (WSN) are deployed to monitor physical events such as fire, or the state of physical objects such as bridges in order to support appropriate reaction to avoid potential damages. However, many situations require immediate attention or long reaction plan. Therefore, the classical approach of just detecting the...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2009

    Improving Mobile Target Detection on Randomly Deployed Sensor Networks

    This paper investigates the detection performance of randomly deployed wireless sensor networks. It addresses the problem of detecting mobile targets that have continuous movement. The authors categorise these targets into two classes. The first type is rational targets, which have the knowledge of existing sensors. The other type is on...

    Provided By Inderscience Enterprises

  • White Papers // Nov 2010

    A Survey on RFID Security and Provably Secure Grouping-Proof Protocols

    RFID security is a relatively new research area. Within less than a decade, a large number of research papers dealing with security issues of RFID technology have appeared. In the first part of this paper, the authors attempt to summarise current research in the field of RFID security and discuss...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2011

    Enhancing Lifetime of Wireless Sensor Networks Using Multiple Data Sinks

    In this paper, the authors address the fundamental question concerning the limits on the network lifetime in sensor networks when multiple Base Stations (BSs) are deployed as data sinks. Specifically, they derive upper bounds on the network lifetime when multiple BSs are employed, and obtain optimum locations of the base...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2010

    Quality-Aware Sensor Data Collection

    Many sensor applications often require collecting raw sensed values from many sensor nodes to one centralised server. Sensor data collection typically comes with various quality requirements, e.g. the level of precision requested for temperature values, the time constraints for getting the data, or the percentage of data that is needed....

    Provided By Inderscience Enterprises

  • White Papers // Oct 2010

    Virtual ID: ID/Locator Split in a Mobile IP Environment for Mobility, Multihoming and Location Privacy for the Next Generation Wireless Networks

    Current networking protocols designed around single interface stationary end-systems clearly fail to represent the present communication context of mobile, multi-interface end-systems. Also, the convergence of wired and wireless technologies into an All-IP (AIP) next generation network will make available multiple diversified contexts that can be leveraged for better fault tolerance,...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2009

    Non-Linearity Effects and Predistortion in Optical OFDM Wireless Transmission Using LEDs

    Orthogonal Frequency Division Multiplexing (OFDM) is a promising technique to realise high-speed indoor Optical Wireless (OW) links through the exploitation of the high Peak-to-Average Power Ratio (PAPR) for Intensity Modulation (IM). However, the non-linear characteristic of a Light Emitting Diode (LED) imposes limitations on the performance. In this paper, the...

    Provided By Inderscience Enterprises

  • White Papers // Nov 2009

    Predictive Risk Modelling for Forecasting High-Cost Patients: A Real-World Application Using Medicaid Data

    Approximately two - thirds of healthcare costs are accounted for by 10% of the patients. Identifying such high-cost patients early can help improve their health and reduce costs. Data from the Arizona Health Care Cost Containment System provides a unique opportunity to exploit state-of-the-art data analysis algorithms to mine data...

    Provided By Inderscience Enterprises

  • White Papers // May 2009

    Recent Trends and Developments in e-Banking in an Underdeveloped Nation - An Empirical Study

    This paper describes about the major issues and challenges in the development of the electronic banking (e-banking) industry of a relatively underdeveloped nation. This research shows that even in many less developed nations, the application of e-banking can help their local banks reduce operating costs and provide a better and...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2009

    Proximity-Based Authentication of Mobile Devices

    Securing interactions between devices that do not know each other a priori is an important and challenging task. This paper presents Amigo, a technique to authenticate co-located devices using knowledge of their shared radio environment as proof of physical proximity. The authors present evaluation results that show that the technique...

    Provided By Inderscience Enterprises

  • White Papers // May 2009

    Towards Collaborative Data Reduction in Stream-Processing Systems

    Recent years have seen data-intensive applications that feed on near-real time 'Context' information, such as location, environmental status and surrounding resources, collected from distributed data sources leveraging sensor networks. Those data sources, such as click-streams, stock quotes and sensor data, are often characterized as fast-rate high-volume 'Streams' (Babcock et al.,...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2010

    Cryptanalysis and Security Enhancement on the Generation of Mu-Varadharajan Electronic Voting Protocol

    Mu and Varadharajan proposed an electronic voting scheme and claimed that their scheme authenticates the Voters, protects the anonymity of them, and detects the identity of double voters. Due to some weaknesses in Mu-Varadharajan scheme, several modified schemes have been proposed by Lin et al., Hwang et al., Rodr?guez-Henr?quez et...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2011

    Future Wireless Networks: Key Issues and a Survey (ID/Locator Split Perspective)

    Future Wireless Networks (FWNs) are expected to be a convergence of different kinds of wireless technologies, such as cellular technologies, Wireless Local Area Networks (WLANs), wireless metropolitan area networks, wireless sensor networks, and traditional wired networks. Although users and/or customers will be oblivious to the specific underlying network being used...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2009

    A Citation-Based Ranking Of The Business Ethics Scholarly Journals

    The purpose of this paper is to develop a ranking of academic business ethics journals. For this, a revealed preference approach, also known as a citation impact method, was employed. The citation data were generated by using Google Scholar; h-index, g-index and hc-index were utilised to obtain a ranking. It...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2009

    Mitigating Routing Vulnerabilities in Ad Hoc Networks Using Reputations

    Nodes in mobile ad hoc networks have limited transmission ranges that necessitate multihop communication. Hence the nodes expect their neighbours to relay the packets meant for nodes out of the transmission range of the source. Ad hoc networks are based on the fundamental assumption that if a node promises to...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2009

    The Biometric Potential of Transient Otoacoustic Emissions

    Whilst the hearing capabilities of the ear are well known and extensively studied, less well known is the fact that the ear can produce sounds. These faint sounds are called otoacoustic emissions and are an involuntary feature of the biomechanical system employed to hear low amplitude sounds. Several distinct types...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2009

    Data Quality Management in Wireless Sensor Networks: Guest Editorial

    As new fabrication and integration technologies continue to reduce the cost and size of wireless sensors, the observation and control of the physical world will expand dramatically with the temporally and spatially dense monitoring afforded by wireless sensor network technology. Several applications such as ZebraNet, Counter-sniper system, environment sampling, target...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2009

    Strategy-Based Behavioural Biometrics: A Novel Approach to Automated Identification

    Behavioural intrusion detection is a frequently used for insuring network security. This paper expends behaviour based intrusion detection approach to a new domain of game networks. Specifically, the research shows that a behavioural biometric signature can be generated based on the strategy used by an individual to play a game....

    Provided By Inderscience Enterprises

  • White Papers // Oct 2009

    A Realistic Mobility Model for Wireless Networks of Scale-Free Node Connectivity

    Recently, researchers have discovered that many of social, natural and biological networks are characterized by scale-free power law connectivity distribution and a few densely populated nodes, known as hubs. The authors envision that wireless networks are directly deployed over such real-world networks to facilitate communication among participating entities. Here nodes...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2010

    The Impact of Virtualization on the Performance and Operational Costs of Massively Multiplayer Online Games

    Today's highly successful Massively Multiplayer Online Games (MMOGs) have millions of registered users and hundreds of thousands of active concurrent players. Motivated by performance and portability, MMOG operators currently pre-provision and then maintain throughout the lifetime of the game tens of thousands of compute resources in data centers located across...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2010

    The Next Generation Grid: An Infrastructure For Global Business Systems

    This paper traces the evolution of the Grid and discusses the potential of the Grid as a future infrastructure adapted to the dynamics of global business systems - the global supply chain. Technology challenges facing global business systems are framed in volume (scale), real-time distribution, and real-time universal access to...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2008

    Privacy Analysis and Enhancements for Data Sharing in *nix Systems

    This paper analyses the data sharing mechanisms of *nix systems and identify an immediate need for better privacy support. For example, using a simple insider attack the authors were able to access over 84 GB of private data at one organisation of 825 users, including 300 000 e-mails and 579...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2008

    Resource Allocation for Real-Time and Multimedia Communications in TDMA-Based Wireless Networks

    In order to support multimedia traffic, QoS routing protocols for Mobile Ad Hoc NETworks (MANETs) allow finding a path between two nodes which satisfies the application layer's minimum bandwidth requirements. Currently, such protocols exist for TDMA, and CDMA-over-TDMA environments. However, these protocols do not account for race conditions which can...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2010

    Information Security and Privacy in Healthcare: Current State of Research

    Information security and privacy in the healthcare sector is an issue of growing importance. The adoption of digital patient records, increased regulation, provider consolidation and the increasing need for information exchange between patients, providers and payers, all point towards the need for better information security. The authors critically survey the...

    Provided By Inderscience Enterprises

  • White Papers // May 2010

    Integration of IEEE 802.21 Services and Pre-Authentication Framework

    IEEE 802.21 standard and its services address the challenges of seamless mobility for multi-interface devices. The authors focus on a proof-of-concept implementation that integrates IEEE 802.21 services and a pre-authentication framework, to optimise handover performance in two different scenarios. The first scenario is initiated by the mobile node and the...

    Provided By Inderscience Enterprises

  • White Papers // Nov 2009

    Semantic Enabled Metadata Management in PetaShare

    The authors designed a semantic enabled metadata framework using ontology for multi-disciplinary and multi-institutional large scale scientific data sets in a Data Grid setting. Two main issues are addressed: data integration for semantically and physically heterogeneous distributed knowledge stores, and semantic reasoning for data verification and inference in such a...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2009

    Uncertainty-Aware Wireless Sensor Networks

    The characterisation of uncertainty and the management of Quality of Service are important issues in mobile communications. In a Wireless Sensor Network, there is a high probability of redundancy, correlation and noise in the sensor features since data is often collected from a large array of densely deployed neighbouring sensors....

    Provided By Inderscience Enterprises

  • White Papers // Jun 2010

    Rigidity Guided Localisation for Mobile Robotic Sensor Networks

    This paper introduces a rigidity-guided localisation approach for mobile robotic sensor networks. The localisation uses a distance graph composed of both the robot-to-robot ranging data and the motion trajectories from robot odometry. The motion of a robot depends on the result of the rigidity test of its local distance graph:...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2010

    An Interference and Load Aware Routing Metric for Wireless Mesh Networks

    This paper proposes a load and interference-aware routing metric for wireless mesh networks, named Channel Utilisation and Contention Window Based (C2WB) metric. The authors' metric assigns weights to individual links which are proportional to the links service times estimated from both channel utilisation and the average contention window of the...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2009

    Power-Delay Analysis of Consensus Algorithms on Wireless Networks With Interference

    The authors study the convergence of the average consensus algorithm in wireless networks in the presence of interference. For regular lattices with periodic boundary conditions, they characterise the convergence properties of an optimal Time Division Multiple Access (TDMA) protocol that maximises the speed of convergence on these networks. They provide...

    Provided By Inderscience Enterprises