Inderscience Enterprises

Displaying 1-40 of 104 results

  • White Papers // Jul 2013

    A Rough Set-Based Effective Rule Generation Method for Classification With an Application in Intrusion Detection

    In this paper, the authors use Rough Set Theory (RST) to address the important problem of generating decision rules for data mining. In particular, they propose a rough set-based approach to mine rules from inconsistent data. It computes the lower and upper approximations for each concept, and then builds concise...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2013

    A PLCS Framework for PDM/ERP Interoperabilty

    Wide diffusion of methodologies and software relevant to Product Lifecycle Management (PLM) in industrial companies faces heterogeneity of Information Technology (IT) systems. Especially, the lack of interoperability between Product Data Management (PDM) systems, that drive virtual product development, and Enterprise Resource Planning (ERP), which manages real product, cannot lead to...

    Provided By Inderscience Enterprises

  • White Papers // Nov 2012

    Authenticating Strangers in Online Social Networks

    In current Online Social Networks (OSNs), it is necessary for a user to determine whether a claimed public key belongs to a target user. In this paper, the authors design a system to complete this task. They first find a common friend between two users and let her help to...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2012

    Data Contracts for Cloud-based Data Marketplaces

    Currently, rich and diverse data types have been increasingly provided using the Data-as-a-Service (DaaS) model, a form of cloud computing services and the core element of data marketplaces. This facilitates the on-the-fly data composition and utilization for several data-intensive applications in e-science and business domains. However, data offered by DaaS...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2012

    A Framework for Integrating IT Governance and Business/IT Alignment Principles

    Highly information-intensive organizations such as retail banks continuously struggle with the key issues of controlling their IT-value and achieving business-IT alignment. One main reason might be that decision makers in retail banks do not use methods to plan or improve their business-IT alignment. This paper provides such a method, combining...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2012

    Many-to-One Communication Protocol for Wireless Sensor Networks

    This paper proposes a novel communication protocol, called Many-to-One Sensors-to-Sink (MOSS), tailored to Wireless Sensor Networks (WSNs). It exploits the unique sensors-to-sink traffic pattern to realize low-overhead medium access and low-latency sensors-to-sink routing paths. In conventional schedule-based MAC protocols such as S-MAC, sensor nodes in the proximity of the event...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2012

    Hierarchical DWT-Based Optimal Diversity Power Allocation for Video Transmission in OFDMA/MIMO Wireless Systems

    In this paper, the authors propose novel algorithms for optimal power allocation towards video transmission in Orthogonal Frequency Division Multiple Access (OFDMA) and Multiple-Input Multiple-Output (MIMO)-based 4G networks. A unique feature of the schemes is that they employ diversity dependent subcarrier power distribution relying on a Discrete Wavelet Transform (DWT)-based...

    Provided By Inderscience Enterprises

  • White Papers // May 2012

    Energy-Efficient Transmission and Bit Allocation Schemes in Wireless Sensor Networks

    Energy-efficient transmission and bit allocation schemes are investigated in multisource single-sink Wireless Sensor Networks (WSNs). For transmission over Additive White Gaussian Noise (AWGN) channels with path loss, this work shows that the overall energy consumption can be minimised if each sensor transmits with the minimum power and cooperates with others...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2012

    Local Key Management in Opportunistic Networks

    Opportunistic networks are a new and specific type of mobile peer-to-peer networks where end-to-end connectivity cannot be assumed. These networks present compelling challenges, especially from a security perspective, as interactive protocols are infeasible in such environments. In this paper, the authors focus on the problem of key management in the...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2012

    Process-Driven Biometric Identification by Means of Autonomic Grid Components

    Today's business applications are increasingly process driven, meaning that the main application logic is executed by a dedicate process engine. In addition, component-oriented software development has been attracting attention for building complex distributed applications. In this paper, the authors present the experiences gained from building a process-driven biometric identification application...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Designing a Flexible and Low-Cost Testbed for Wireless Sensor Networks

    Setting up a Wireless Sensor Network (WSN) for an experiment is both time consuming and effort intensive. Many testbeds connect and manage experimental nodes using wires and gateways. It leads to extra cost, extensive setup and maintenance effort and dedicated deployment place. The authors propose a framework for implementing a...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    A Source Authentication Scheme Using Network Coding

    In this paper, the authors explore the security merits of network coding and potential trade-offs with the widely accepted throughput benefits, especially in multicast scenarios. In particular, they propose a novel Source Authentication using Network Coding (SANC) scheme. Towards this objective, they propose a general framework for embedding the authentication...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Friendship-Based Location Privacy in Mobile Social Networks

    Location privacy in Mobile Social Networks (MSNs) has generated significant interest in recent years, with many proposed methods to address the problem. Commercial solutions to this problem have suggested designing better ways for users to determine when to report their locations, while academic researchers have proposed solutions that involve deploying...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Integrated Service Engineering Workbench: Service Engineering for Digital Ecosystems

    The evolution of service-oriented architectures towards digital ecosystems comprehends a number of challenges. One challenge is to develop services in a dynamic environment with high uncertainties and in collaboration with other companies. Another challenge lies in how to describe services sufficiently for trading them in digital ecosystems. This paper explores...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Syntax Vs. Semantics: Competing Approaches to Dynamic Network Intrusion Detection

    In this paper, the authors have described both syntax-based and semantic based approaches for dynamic network intrusion detection. For syntax-based approaches, they evaluated a fixed-partition and variable-length partition sliding-window scheme for automatic worm generation. Their results indicate that the variable length partition scheme is more flexible and can handle several...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2011

    Detection and Prevention of Botnets and Malware in an Enterprise Network

    One of the most significant threats faced by enterprise networks today is from Bots. A Bot is a program that operates as an agent for a user and runs automated tasks over the internet, at a much higher rate than would be possible for a human alone. A collection of...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2011

    A Rule-Based Approach to Model and Verify Flexible Business Processes

    Efficient organizations need to ensure that their business processes are flexible so that these processes can easily accommodate changes in regulations and policies. Appropriate techniques to model and verify these processes are required. In this paper, the authors present a rule-based approach, which is built upon the Event-Condition-Action model (ECA)...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2011

    Name-Based View Integration for Enhancing The Reusability in Process-Driven SOAs

    Many companies opt for reusing existing software development artefacts due to the benefits of the reuse such as increasing productivity, shortening time-to-market, and spending less time for testing, debugging, to name but a few. Unfortunately, reusing artefacts in existing process-driven SOA technologies is cumbersome and hard to achieve due to...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2011

    Reliable Congestion-Aware Information Transport in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) constitute the transportation conduit for the results of the in-network processing of the raw data. In WSNs the sensor node and communication level perturbations are often the norm than the exception due to varied environmental conditions. Consequently, the diverse applications supported by WSNs stipulate their individual...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2011

    Rendezvous Based Trust Propagation to Enhance Distributed Network Security

    Development of network of nodes connected with their trust values and the propagation of these trust values to far away nodes are basic operations of the modern day trustworthy networks. Trust can be exploited to mitigate the security threats in wireless network. Most of the existing trust propagation methods are...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2011

    Enhancing Lifetime of Wireless Sensor Networks Using Multiple Data Sinks

    In this paper, the authors address the fundamental question concerning the limits on the network lifetime in sensor networks when multiple Base Stations (BSs) are deployed as data sinks. Specifically, they derive upper bounds on the network lifetime when multiple BSs are employed, and obtain optimum locations of the base...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2011

    Towards Modelling the Impact of Cyber Attacks on a Smart Grid

    This paper provides an introduction to cyber attack impact analysis in the smart grid and highlights existing research in the field. The authors present an impact analysis framework where they focus on the model synthesis stage where both cyber and physical grid entity relationships are modelled as directed graphs. Each...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2011

    Mobile Multimedia in Wireless Sensor Networks

    One of the most referred and promising Wireless Sensor Network (WSN) applications is health monitoring. The small size and portability of nodes have made WSNs the perfect tool to easily monitor a person's health condition. In this type application, as well as in several other critical applications, reliability and mobility...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2011

    Success Guaranteed Routing in Almost Delaunay Planar Nets for Wireless Sensor Communication

    This paper proposes a routing strategy for wireless sensor networks that is valid even when the sensor nodes are distributed non-uniformly. Energy efficiency is the most important consideration in wireless sensor networks; hence, global communication should be achieved by combinations of local messages. The authors first propose a new underlying...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2011

    Future Wireless Networks: Key Issues and a Survey (ID/Locator Split Perspective)

    Future Wireless Networks (FWNs) are expected to be a convergence of different kinds of wireless technologies, such as cellular technologies, Wireless Local Area Networks (WLANs), wireless metropolitan area networks, wireless sensor networks, and traditional wired networks. Although users and/or customers will be oblivious to the specific underlying network being used...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2010

    Caching Personalised and Database-Related Dynamic Web Pages

    In recent years, web development is the most important application in internet. Caching related technique improves the web server performance significantly. However, existing caching schemes cannot deal with the dynamic web pages efficiently. Thus, in this paper, the authors propose a caching scheme and then use web session objects and...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2010

    An Interference and Load Aware Routing Metric for Wireless Mesh Networks

    This paper proposes a load and interference-aware routing metric for wireless mesh networks, named Channel Utilisation and Contention Window Based (C2WB) metric. The authors' metric assigns weights to individual links which are proportional to the links service times estimated from both channel utilisation and the average contention window of the...

    Provided By Inderscience Enterprises

  • White Papers // Nov 2010

    A Survey on RFID Security and Provably Secure Grouping-Proof Protocols

    RFID security is a relatively new research area. Within less than a decade, a large number of research papers dealing with security issues of RFID technology have appeared. In the first part of this paper, the authors attempt to summarise current research in the field of RFID security and discuss...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2010

    Virtual ID: ID/Locator Split in a Mobile IP Environment for Mobility, Multihoming and Location Privacy for the Next Generation Wireless Networks

    Current networking protocols designed around single interface stationary end-systems clearly fail to represent the present communication context of mobile, multi-interface end-systems. Also, the convergence of wired and wireless technologies into an All-IP (AIP) next generation network will make available multiple diversified contexts that can be leveraged for better fault tolerance,...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2010

    Developing a Lean Design for Six Sigma Through Supply Chain Methodology

    The Six-Sigma systems can promote the enterprise competitive ability, such as pursuing cost improvement, promoting quality, the customer's satisfaction and valid strategy performance. This paper explored the synergies resulting from the combination of state-of-the art quality initiatives, lean and design for Six Sigma, and develop an integrated SCOR with lean...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2010

    The Impact of Virtualization on the Performance and Operational Costs of Massively Multiplayer Online Games

    Today's highly successful Massively Multiplayer Online Games (MMOGs) have millions of registered users and hundreds of thousands of active concurrent players. Motivated by performance and portability, MMOG operators currently pre-provision and then maintain throughout the lifetime of the game tens of thousands of compute resources in data centers located across...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2010

    Wireless Sensor Networks for Soil Science

    Wireless sensor networks can revolutionize soil ecology by providing measurements at temporal and spatial granularities previously impossible. This paper presents the authors' first steps towards fulfilling that goal by developing and deploying two experimental soil monitoring networks at urban forests in Baltimore, MD. The nodes of these networks periodically measure...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2010

    An Overview of Achieving Energy Efficiency in On-Chip Networks

    Energy efficient NoC design is necessary to optimise power consumption at SoCs and CMPs. Energy efficiency can be achieved through careful optimisation at different levels, such as component, circuit, and architectural level. This paper reviewed different techniques and tools to achieve energy efficiency at each of the aforementioned levels. Adopting...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2010

    A Cross-Layer Protocol for Cooperative Content Delivery Over Mobile Ad-Hoc Networks

    Real-time multimedia streaming over MANETs is an active research field since this technology promises scalable and robust audio/video delivery without infrastructure. Even though this problem has several commune features with peer-to-peer routing, the additional sensible parameters of MANETs make wired solutions unfit to this case; therefore, the authors propose a...

    Provided By Inderscience Enterprises

  • White Papers // Jul 2010

    On-Chip Implementation of Multiprocessor Networks and Switch Fabrics

    Future VLSI technology will enable hundreds, or even thousands, of Processing Elements (PEs) being integrated on the same chip. At the same time, Systems-on-Chip (SoCs) applications also demand higher data-processing capability that can perform parallel and multi-threading tasks. On-chip implementation of multiprocessor systems needs to planarise the interconnect networks onto...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2010

    Information Security and Privacy in Healthcare: Current State of Research

    Information security and privacy in the healthcare sector is an issue of growing importance. The adoption of digital patient records, increased regulation, provider consolidation and the increasing need for information exchange between patients, providers and payers, all point towards the need for better information security. The authors critically survey the...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2010

    Rigidity Guided Localisation for Mobile Robotic Sensor Networks

    This paper introduces a rigidity-guided localisation approach for mobile robotic sensor networks. The localisation uses a distance graph composed of both the robot-to-robot ranging data and the motion trajectories from robot odometry. The motion of a robot depends on the result of the rigidity test of its local distance graph:...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2010

    Indoor GPS: System Functionality and Initial Performance Evaluation

    Indoor GPS (IGPS) is a newly developed laser based measuring system for large scale metrology. The relative portability, reconfigurability and ease of installation make the IGPS suitable for many industries manufacturing large scale products. The system performance depends on both the components characteristics and their physical configuration. Hence, an important...

    Provided By Inderscience Enterprises

  • White Papers // May 2010

    Integration of IEEE 802.21 Services and Pre-Authentication Framework

    IEEE 802.21 standard and its services address the challenges of seamless mobility for multi-interface devices. The authors focus on a proof-of-concept implementation that integrates IEEE 802.21 services and a pre-authentication framework, to optimise handover performance in two different scenarios. The first scenario is initiated by the mobile node and the...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2010

    A Novel Framework for Mobile Attack Strategy Modelling and Vulnerability Analysis in Wireless Ad Hoc Networks

    Global dissemination of information and tools for computer networks, has allowed for major system attacks affecting critical network points and resulting in significant network performance degradation. In this paper, the authors present a probabilistic modeling framework for the propagation of an energy-constrained mobile threat in a wireless ad hoc network....

    Provided By Inderscience Enterprises

  • White Papers // Jun 2009

    An Architectural Level Design Methodology for Smart Camera Applications

    Today's embedded computing applications are characterized by increased functionality, and hence increased design complexity and processing requirements. The resulting design spaces are vast and designers are typically able to evaluate only small subsets of solutions due to lack of efficient design tools. In this paper, the authors propose an architectural...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2007

    A Unified Multiple-Level Cache for High Performance Storage Systems

    Multi-level cache hierarchies are widely used in high-performance storage systems to improve I/O performance. However, traditional cache management algorithms are not suited well for such cache organizations. Recently proposed multi-level cache replacement algorithms using aggressive exclusive caching work well with single or multiple-client, low-correlated workloads, but suffer serious performance degradation...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Syntax Vs. Semantics: Competing Approaches to Dynamic Network Intrusion Detection

    In this paper, the authors have described both syntax-based and semantic based approaches for dynamic network intrusion detection. For syntax-based approaches, they evaluated a fixed-partition and variable-length partition sliding-window scheme for automatic worm generation. Their results indicate that the variable length partition scheme is more flexible and can handle several...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2010

    Technically Approaching the Semantic Web Bottleneck

    After several years of research, the fundamental Semantic Web technologies have reached a high maturity level. Nevertheless, the average Web user has not yet taken advantage of their full potential. In this paper, the authors introduce the Semantic Web bottleneck, analyze the main problems that preserve it and suggest ways...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2011

    Detection and Prevention of Botnets and Malware in an Enterprise Network

    One of the most significant threats faced by enterprise networks today is from Bots. A Bot is a program that operates as an agent for a user and runs automated tasks over the internet, at a much higher rate than would be possible for a human alone. A collection of...

    Provided By Inderscience Enterprises

  • White Papers // May 2012

    Energy-Efficient Transmission and Bit Allocation Schemes in Wireless Sensor Networks

    Energy-efficient transmission and bit allocation schemes are investigated in multisource single-sink Wireless Sensor Networks (WSNs). For transmission over Additive White Gaussian Noise (AWGN) channels with path loss, this work shows that the overall energy consumption can be minimised if each sensor transmits with the minimum power and cooperates with others...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2010

    On Investigating ARP Spoofing Security Solutions

    The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attacks, a malicious host can either impersonate another host [Man-In-the-Middle attack (MiM)] and gain access to sensitive information, or perform Denial of Service...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2012

    Hierarchical DWT-Based Optimal Diversity Power Allocation for Video Transmission in OFDMA/MIMO Wireless Systems

    In this paper, the authors propose novel algorithms for optimal power allocation towards video transmission in Orthogonal Frequency Division Multiple Access (OFDMA) and Multiple-Input Multiple-Output (MIMO)-based 4G networks. A unique feature of the schemes is that they employ diversity dependent subcarrier power distribution relying on a Discrete Wavelet Transform (DWT)-based...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2012

    Many-to-One Communication Protocol for Wireless Sensor Networks

    This paper proposes a novel communication protocol, called Many-to-One Sensors-to-Sink (MOSS), tailored to Wireless Sensor Networks (WSNs). It exploits the unique sensors-to-sink traffic pattern to realize low-overhead medium access and low-latency sensors-to-sink routing paths. In conventional schedule-based MAC protocols such as S-MAC, sensor nodes in the proximity of the event...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Friendship-Based Location Privacy in Mobile Social Networks

    Location privacy in Mobile Social Networks (MSNs) has generated significant interest in recent years, with many proposed methods to address the problem. Commercial solutions to this problem have suggested designing better ways for users to determine when to report their locations, while academic researchers have proposed solutions that involve deploying...

    Provided By Inderscience Enterprises

  • White Papers // Nov 2008

    Adaptive Peer-to-Peer Streaming Over Hybrid Wireless Networks

    In this paper, the authors propose a centralised Peer-To-Peer (P2P) streaming over hybrid wireless networks to mitigate the congestion at the Access Point (AP) in Wireless Local Area Networks (WLANs). In their proposed architecture, an adaptive receiver-driven mechanism is used to coordinate the streaming from multiple senders. They also propose...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2006

    The Proposal of a Comparative Framework to Evaluate e-Business Stages of Growth Models

    This paper proposes a comparative framework for contrasting e-business growth models within the context of small and medium enterprises. Growth models act both as a mechanism for understanding e-business growth and as an aid to implementation and policy development. This study reviews the performance of 65 e-business growth models, which...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2006

    ERP - A Moving Target

    Enterprise Resource Planning systems are central elements in long-term wide-ranging design and use networks. Present ERP research focuses on single-enterprise implementation and fails to address important features of the ERP networks such as multi-spatiality, the design of the generic and the dynamics over time. A six-field matrix is proposed as...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2009

    Evaluation of Business Solutions in Manufacturing Enterprises

    Evaluating business solutions before being deployed is essential for any organization. Risk is emerging as one of the most preeminent and accepted metrics for the evaluations of business solutions. In this paper, the authors present a comprehensive case study where the Tropos Goal-Risk framework is used to assess and treat...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2007

    SMEs Funding: An Assessment of an Intervention Scheme in Nigeria

    This paper evaluates the impact of the Small and Medium Enterprises Equity Investment Scheme (SMEEIS) on the growth of Nigerian SMEs. Questionnaires and interviews were used to sample firms and commercial banks in Lagos, an industrially active environment. Uncoordinated business plans and poorly packaged projects were found to be the...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2012

    Process-Driven Biometric Identification by Means of Autonomic Grid Components

    Today's business applications are increasingly process driven, meaning that the main application logic is executed by a dedicate process engine. In addition, component-oriented software development has been attracting attention for building complex distributed applications. In this paper, the authors present the experiences gained from building a process-driven biometric identification application...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2009

    Rule-Based Business Process Modelling and Enactment

    A Business Process Model is called rule-based if the logic of its control flow, data flow and resource allocation is declaratively expressed by means of business rules. Business rules are recognized as powerful representation forms that can potentially define the semantics of Business Process Models and business vocabulary. To date,...

    Provided By Inderscience Enterprises

  • White Papers // May 2007

    Ontology-Based Knowledge Networks for User Training in Business Process Management

    Successful business process design requires active participation of users who are familiar with organizational activities and business process modeling concepts. Hence, there is a need to provide users with reusable, flexible, agile and adaptable training material in order to enable them instil their knowledge and expertise in business process design...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2012

    Data Contracts for Cloud-based Data Marketplaces

    Currently, rich and diverse data types have been increasingly provided using the Data-as-a-Service (DaaS) model, a form of cloud computing services and the core element of data marketplaces. This facilitates the on-the-fly data composition and utilization for several data-intensive applications in e-science and business domains. However, data offered by DaaS...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2011

    Name-Based View Integration for Enhancing The Reusability in Process-Driven SOAs

    Many companies opt for reusing existing software development artefacts due to the benefits of the reuse such as increasing productivity, shortening time-to-market, and spending less time for testing, debugging, to name but a few. Unfortunately, reusing artefacts in existing process-driven SOA technologies is cumbersome and hard to achieve due to...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2008

    Using Process Mining to Learn from Process Changes in Evolutionary Systems

    Traditional information systems struggle with the requirement to provide flexibility and process support while still enforcing some degree of control. Accordingly, adaptive Process Management Systems (PMSs) have emerged that provide some flexibility by enabling dynamic process changes during runtime. Based on the assumption that these process changes are recorded explicitly,...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2013

    A PLCS Framework for PDM/ERP Interoperabilty

    Wide diffusion of methodologies and software relevant to Product Lifecycle Management (PLM) in industrial companies faces heterogeneity of Information Technology (IT) systems. Especially, the lack of interoperability between Product Data Management (PDM) systems, that drive virtual product development, and Enterprise Resource Planning (ERP), which manages real product, cannot lead to...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Integrated Service Engineering Workbench: Service Engineering for Digital Ecosystems

    The evolution of service-oriented architectures towards digital ecosystems comprehends a number of challenges. One challenge is to develop services in a dynamic environment with high uncertainties and in collaboration with other companies. Another challenge lies in how to describe services sufficiently for trading them in digital ecosystems. This paper explores...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2010

    Developing a Lean Design for Six Sigma Through Supply Chain Methodology

    The Six-Sigma systems can promote the enterprise competitive ability, such as pursuing cost improvement, promoting quality, the customer's satisfaction and valid strategy performance. This paper explored the synergies resulting from the combination of state-of-the art quality initiatives, lean and design for Six Sigma, and develop an integrated SCOR with lean...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2011

    A Rule-Based Approach to Model and Verify Flexible Business Processes

    Efficient organizations need to ensure that their business processes are flexible so that these processes can easily accommodate changes in regulations and policies. Appropriate techniques to model and verify these processes are required. In this paper, the authors present a rule-based approach, which is built upon the Event-Condition-Action model (ECA)...

    Provided By Inderscience Enterprises

  • White Papers // Jul 2008

    Privacy-Preserving Data Mining in the Malicious Model

    Most of the cryptographic work in privacy-preserving distributed data mining deals with semi-honest adversaries, which are assumed to follow the prescribed protocol but try to infer private information using the messages they receive during the protocol. Although the semi-honest model is reasonable in some cases, it is unrealistic to assume...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2010

    A Novel Framework for Mobile Attack Strategy Modelling and Vulnerability Analysis in Wireless Ad Hoc Networks

    Global dissemination of information and tools for computer networks, has allowed for major system attacks affecting critical network points and resulting in significant network performance degradation. In this paper, the authors present a probabilistic modeling framework for the propagation of an energy-constrained mobile threat in a wireless ad hoc network....

    Provided By Inderscience Enterprises

  • White Papers // Jan 2007

    Detailed DoS Attacks in Wireless Networks and Countermeasures

    IEEE 802.11 wireless networks are one of the fastest growing network technologies. The users only need to have a mobile device with a wireless network adapter that negotiates with an access point or base station. Once authenticated and associated, the user can seamlessly roam within the coverage area of the...

    Provided By Inderscience Enterprises

  • White Papers // Jul 2013

    A Rough Set-Based Effective Rule Generation Method for Classification With an Application in Intrusion Detection

    In this paper, the authors use Rough Set Theory (RST) to address the important problem of generating decision rules for data mining. In particular, they propose a rough set-based approach to mine rules from inconsistent data. It computes the lower and upper approximations for each concept, and then builds concise...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2008

    On the Relation Among Various Security Models for Certificateless Cryptography

    Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and security models currently hinders its progression as much effort has been put on refining the definitions and looking for an appropriate and practical security models....

    Provided By Inderscience Enterprises

  • White Papers // Dec 2008

    An Efficient One-move Nominative Signature Scheme

    A signer in a Nominative Signature (NS) scheme can arbitrarily choose a nominee, then jointly generate a signature in such a way that the signature can only be verified with the nominee's consent. NS is particularly useful in user certification systems. Currently, the only secure NS scheme available requires multi-round...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2009

    Mitigating Routing Vulnerabilities in Ad Hoc Networks Using Reputations

    Nodes in mobile ad hoc networks have limited transmission ranges that necessitate multihop communication. Hence the nodes expect their neighbours to relay the packets meant for nodes out of the transmission range of the source. Ad hoc networks are based on the fundamental assumption that if a node promises to...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2009

    Standards for Security Associations in Personal Networks: A Comparative Analysis

    Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. It is particularly challenging to make this process of associating devices easy-to-use, secure and inexpensive at the same time. A cornerstone of this process is key...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2009

    Learning Under Pressure: Learning Strategies, Workplace Climate, And Leadership Style In The Hospitality Industry

    In this paper, the authors explored the relationship among learning strategies, leadership style, and work environment for middle managers in the hospitality industry. They found an association between learning strategy and workplace climate; they also found an association with leadership style, but to a lesser extent. In the hospitality industry,...

    Provided By Inderscience Enterprises

  • White Papers // Jul 2009

    Structuring Dyadic Relationships Between Export Producers And Intermediaries

    How do export producers and intermediaries structure their dyadic relationships? This paper examines the factors that guide the behaviour and relationships between export producer and intermediary dyads. The authors examine both sides of a dyadic transaction and develop an export producer - intermediary behaviour typology by using a grounded theory...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2011

    Rendezvous Based Trust Propagation to Enhance Distributed Network Security

    Development of network of nodes connected with their trust values and the propagation of these trust values to far away nodes are basic operations of the modern day trustworthy networks. Trust can be exploited to mitigate the security threats in wireless network. Most of the existing trust propagation methods are...

    Provided By Inderscience Enterprises

  • White Papers // May 2009

    Cognitive Networking of Large Scale Wireless Systems

    The authors propose the concept of cognitive networking for large-scale wireless systems, which opportunistically utilises network resources including both spectrum bandwidth and radio availability. Both types of resources cannot be predetermined in large-scale wireless systems, due to various reasons such as interferences and dynamic traffic load. The proposed technology not...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2009

    Longitudinal Knowledge Strategizing In A Long-Term Healthcare Organisation

    Long-term healthcare organisations significantly benefit from Knowledge Management (KM). However, the extant literature has little empirical support for this statement. Using the KM instrument developed by Bontis and Fitz-enz (2002), this paper extends prior studies by evaluating behaviours within a not-for-profit context over several years. As such, it tests a...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2010

    Indoor GPS: System Functionality and Initial Performance Evaluation

    Indoor GPS (IGPS) is a newly developed laser based measuring system for large scale metrology. The relative portability, reconfigurability and ease of installation make the IGPS suitable for many industries manufacturing large scale products. The system performance depends on both the components characteristics and their physical configuration. Hence, an important...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2010

    Wireless Sensor Networks for Soil Science

    Wireless sensor networks can revolutionize soil ecology by providing measurements at temporal and spatial granularities previously impossible. This paper presents the authors' first steps towards fulfilling that goal by developing and deploying two experimental soil monitoring networks at urban forests in Baltimore, MD. The nodes of these networks periodically measure...

    Provided By Inderscience Enterprises