Inderscience Enterprises

Displaying 1-40 of 114 results

  • White Papers // Jun 2014

    Compiling Irregular Applications for Reconfigurable Systems

    Algorithms that exhibit irregular memory access patterns are known to show poor performance on multiprocessor architectures, particularly when memory access latency is variable. Many common data structures, including graphs, trees, and linked-lists, exhibit these irregular memory access patterns. While FPGA-based code accelerators have been successful on applications with regular memory...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2013

    ChronoSym: A New Approach for Fast and Accurate SoC Cosimulation

    The early validation of modern SoC is not anymore feasible using traditional cycle-accurate cosimulations. These are based on the concurrent execution between SW running on multiple Instruction Set Simulators and HW simulators. The challenge is then speeding-up the simulation, without sacrificing the accuracy of traditional methods. The key contribution of...

    Provided By Inderscience Enterprises

  • White Papers // Jul 2013

    A Rough Set-Based Effective Rule Generation Method for Classification With an Application in Intrusion Detection

    In this paper, the authors use Rough Set Theory (RST) to address the important problem of generating decision rules for data mining. In particular, they propose a rough set-based approach to mine rules from inconsistent data. It computes the lower and upper approximations for each concept, and then builds concise...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2013

    A PLCS Framework for PDM/ERP Interoperabilty

    Wide diffusion of methodologies and software relevant to Product Lifecycle Management (PLM) in industrial companies faces heterogeneity of Information Technology (IT) systems. Especially, the lack of interoperability between Product Data Management (PDM) systems, that drive virtual product development, and Enterprise Resource Planning (ERP), which manages real product, cannot lead to...

    Provided By Inderscience Enterprises

  • White Papers // Nov 2012

    Authenticating Strangers in Online Social Networks

    In current Online Social Networks (OSNs), it is necessary for a user to determine whether a claimed public key belongs to a target user. In this paper, the authors design a system to complete this task. They first find a common friend between two users and let her help to...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2012

    A Framework for Integrating IT Governance and Business/IT Alignment Principles

    Highly information-intensive organizations such as retail banks continuously struggle with the key issues of controlling their IT-value and achieving business-IT alignment. One main reason might be that decision makers in retail banks do not use methods to plan or improve their business-IT alignment. This paper provides such a method, combining...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2012

    Data Contracts for Cloud-based Data Marketplaces

    Currently, rich and diverse data types have been increasingly provided using the Data-as-a-Service (DaaS) model, a form of cloud computing services and the core element of data marketplaces. This facilitates the on-the-fly data composition and utilization for several data-intensive applications in e-science and business domains. However, data offered by DaaS...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2012

    Many-to-One Communication Protocol for Wireless Sensor Networks

    This paper proposes a novel communication protocol, called Many-to-One Sensors-to-Sink (MOSS), tailored to Wireless Sensor Networks (WSNs). It exploits the unique sensors-to-sink traffic pattern to realize low-overhead medium access and low-latency sensors-to-sink routing paths. In conventional schedule-based MAC protocols such as S-MAC, sensor nodes in the proximity of the event...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2012

    Hierarchical DWT-Based Optimal Diversity Power Allocation for Video Transmission in OFDMA/MIMO Wireless Systems

    In this paper, the authors propose novel algorithms for optimal power allocation towards video transmission in Orthogonal Frequency Division Multiple Access (OFDMA) and Multiple-Input Multiple-Output (MIMO)-based 4G networks. A unique feature of the schemes is that they employ diversity dependent subcarrier power distribution relying on a Discrete Wavelet Transform (DWT)-based...

    Provided By Inderscience Enterprises

  • White Papers // May 2012

    Energy-Efficient Transmission and Bit Allocation Schemes in Wireless Sensor Networks

    Energy-efficient transmission and bit allocation schemes are investigated in multisource single-sink Wireless Sensor Networks (WSNs). For transmission over Additive White Gaussian Noise (AWGN) channels with path loss, this work shows that the overall energy consumption can be minimised if each sensor transmits with the minimum power and cooperates with others...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2012

    Local Key Management in Opportunistic Networks

    Opportunistic networks are a new and specific type of mobile peer-to-peer networks where end-to-end connectivity cannot be assumed. These networks present compelling challenges, especially from a security perspective, as interactive protocols are infeasible in such environments. In this paper, the authors focus on the problem of key management in the...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2012

    Process-Driven Biometric Identification by Means of Autonomic Grid Components

    Today's business applications are increasingly process driven, meaning that the main application logic is executed by a dedicate process engine. In addition, component-oriented software development has been attracting attention for building complex distributed applications. In this paper, the authors present the experiences gained from building a process-driven biometric identification application...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Designing a Flexible and Low-Cost Testbed for Wireless Sensor Networks

    Setting up a Wireless Sensor Network (WSN) for an experiment is both time consuming and effort intensive. Many testbeds connect and manage experimental nodes using wires and gateways. It leads to extra cost, extensive setup and maintenance effort and dedicated deployment place. The authors propose a framework for implementing a...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    A Source Authentication Scheme Using Network Coding

    In this paper, the authors explore the security merits of network coding and potential trade-offs with the widely accepted throughput benefits, especially in multicast scenarios. In particular, they propose a novel Source Authentication using Network Coding (SANC) scheme. Towards this objective, they propose a general framework for embedding the authentication...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Friendship-Based Location Privacy in Mobile Social Networks

    Location privacy in Mobile Social Networks (MSNs) has generated significant interest in recent years, with many proposed methods to address the problem. Commercial solutions to this problem have suggested designing better ways for users to determine when to report their locations, while academic researchers have proposed solutions that involve deploying...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Integrated Service Engineering Workbench: Service Engineering for Digital Ecosystems

    The evolution of service-oriented architectures towards digital ecosystems comprehends a number of challenges. One challenge is to develop services in a dynamic environment with high uncertainties and in collaboration with other companies. Another challenge lies in how to describe services sufficiently for trading them in digital ecosystems. This paper explores...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Syntax Vs. Semantics: Competing Approaches to Dynamic Network Intrusion Detection

    In this paper, the authors have described both syntax-based and semantic based approaches for dynamic network intrusion detection. For syntax-based approaches, they evaluated a fixed-partition and variable-length partition sliding-window scheme for automatic worm generation. Their results indicate that the variable length partition scheme is more flexible and can handle several...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2011

    Detection and Prevention of Botnets and Malware in an Enterprise Network

    One of the most significant threats faced by enterprise networks today is from Bots. A Bot is a program that operates as an agent for a user and runs automated tasks over the internet, at a much higher rate than would be possible for a human alone. A collection of...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2011

    A Rule-Based Approach to Model and Verify Flexible Business Processes

    Efficient organizations need to ensure that their business processes are flexible so that these processes can easily accommodate changes in regulations and policies. Appropriate techniques to model and verify these processes are required. In this paper, the authors present a rule-based approach, which is built upon the Event-Condition-Action model (ECA)...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2011

    Name-Based View Integration for Enhancing The Reusability in Process-Driven SOAs

    Many companies opt for reusing existing software development artefacts due to the benefits of the reuse such as increasing productivity, shortening time-to-market, and spending less time for testing, debugging, to name but a few. Unfortunately, reusing artefacts in existing process-driven SOA technologies is cumbersome and hard to achieve due to...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2011

    Reliable Congestion-Aware Information Transport in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) constitute the transportation conduit for the results of the in-network processing of the raw data. In WSNs the sensor node and communication level perturbations are often the norm than the exception due to varied environmental conditions. Consequently, the diverse applications supported by WSNs stipulate their individual...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2011

    Rendezvous Based Trust Propagation to Enhance Distributed Network Security

    Development of network of nodes connected with their trust values and the propagation of these trust values to far away nodes are basic operations of the modern day trustworthy networks. Trust can be exploited to mitigate the security threats in wireless network. Most of the existing trust propagation methods are...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2011

    Enhancing Lifetime of Wireless Sensor Networks Using Multiple Data Sinks

    In this paper, the authors address the fundamental question concerning the limits on the network lifetime in sensor networks when multiple Base Stations (BSs) are deployed as data sinks. Specifically, they derive upper bounds on the network lifetime when multiple BSs are employed, and obtain optimum locations of the base...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2011

    Towards Modelling the Impact of Cyber Attacks on a Smart Grid

    This paper provides an introduction to cyber attack impact analysis in the smart grid and highlights existing research in the field. The authors present an impact analysis framework where they focus on the model synthesis stage where both cyber and physical grid entity relationships are modelled as directed graphs. Each...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2011

    Mobile Multimedia in Wireless Sensor Networks

    One of the most referred and promising Wireless Sensor Network (WSN) applications is health monitoring. The small size and portability of nodes have made WSNs the perfect tool to easily monitor a person's health condition. In this type application, as well as in several other critical applications, reliability and mobility...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2011

    Success Guaranteed Routing in Almost Delaunay Planar Nets for Wireless Sensor Communication

    This paper proposes a routing strategy for wireless sensor networks that is valid even when the sensor nodes are distributed non-uniformly. Energy efficiency is the most important consideration in wireless sensor networks; hence, global communication should be achieved by combinations of local messages. The authors first propose a new underlying...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2011

    Future Wireless Networks: Key Issues and a Survey (ID/Locator Split Perspective)

    Future Wireless Networks (FWNs) are expected to be a convergence of different kinds of wireless technologies, such as cellular technologies, Wireless Local Area Networks (WLANs), wireless metropolitan area networks, wireless sensor networks, and traditional wired networks. Although users and/or customers will be oblivious to the specific underlying network being used...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2011

    A Networks-on-Chip Emulation/Verification Framework

    The emulation and functional validation are essential to the assessment of the correctness and performance of networks-on-chip architecture. A flexible hardware/software Network-on-Chip Open Platform (NoCOP) emulation framework is designed and implemented for exploring the on-chip interconnection network architectures. An instruction set simulator and universal serial bus communicator control and configure...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2010

    An Interference and Load Aware Routing Metric for Wireless Mesh Networks

    This paper proposes a load and interference-aware routing metric for wireless mesh networks, named Channel Utilisation and Contention Window Based (C2WB) metric. The authors' metric assigns weights to individual links which are proportional to the links service times estimated from both channel utilisation and the average contention window of the...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2010

    Caching Personalised and Database-Related Dynamic Web Pages

    In recent years, web development is the most important application in internet. Caching related technique improves the web server performance significantly. However, existing caching schemes cannot deal with the dynamic web pages efficiently. Thus, in this paper, the authors propose a caching scheme and then use web session objects and...

    Provided By Inderscience Enterprises

  • White Papers // Nov 2010

    A Survey on RFID Security and Provably Secure Grouping-Proof Protocols

    RFID security is a relatively new research area. Within less than a decade, a large number of research papers dealing with security issues of RFID technology have appeared. In the first part of this paper, the authors attempt to summarise current research in the field of RFID security and discuss...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2010

    Virtual ID: ID/Locator Split in a Mobile IP Environment for Mobility, Multihoming and Location Privacy for the Next Generation Wireless Networks

    Current networking protocols designed around single interface stationary end-systems clearly fail to represent the present communication context of mobile, multi-interface end-systems. Also, the convergence of wired and wireless technologies into an All-IP (AIP) next generation network will make available multiple diversified contexts that can be leveraged for better fault tolerance,...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2010

    Developing a Lean Design for Six Sigma Through Supply Chain Methodology

    The Six-Sigma systems can promote the enterprise competitive ability, such as pursuing cost improvement, promoting quality, the customer's satisfaction and valid strategy performance. This paper explored the synergies resulting from the combination of state-of-the art quality initiatives, lean and design for Six Sigma, and develop an integrated SCOR with lean...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2010

    The Impact of Virtualization on the Performance and Operational Costs of Massively Multiplayer Online Games

    Today's highly successful Massively Multiplayer Online Games (MMOGs) have millions of registered users and hundreds of thousands of active concurrent players. Motivated by performance and portability, MMOG operators currently pre-provision and then maintain throughout the lifetime of the game tens of thousands of compute resources in data centers located across...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2010

    An Overview of Achieving Energy Efficiency in On-Chip Networks

    Energy efficient NoC design is necessary to optimise power consumption at SoCs and CMPs. Energy efficiency can be achieved through careful optimisation at different levels, such as component, circuit, and architectural level. This paper reviewed different techniques and tools to achieve energy efficiency at each of the aforementioned levels. Adopting...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2010

    Wireless Sensor Networks for Soil Science

    Wireless sensor networks can revolutionize soil ecology by providing measurements at temporal and spatial granularities previously impossible. This paper presents the authors' first steps towards fulfilling that goal by developing and deploying two experimental soil monitoring networks at urban forests in Baltimore, MD. The nodes of these networks periodically measure...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2010

    A Cross-Layer Protocol for Cooperative Content Delivery Over Mobile Ad-Hoc Networks

    Real-time multimedia streaming over MANETs is an active research field since this technology promises scalable and robust audio/video delivery without infrastructure. Even though this problem has several commune features with peer-to-peer routing, the additional sensible parameters of MANETs make wired solutions unfit to this case; therefore, the authors propose a...

    Provided By Inderscience Enterprises

  • White Papers // Jul 2010

    Network Interface Design Based on Mutual Interface Definition

    In this paper, the authors propose a novel network interface design method, referred to as mutual interface definition based method. It decouples Resource Dependent Part (RDP) from Resource Independent Part (RIP) by mutual interface definition. These two parts can be designed independently, thus the design flexibility and reusability of network...

    Provided By Inderscience Enterprises

  • White Papers // Jul 2010

    A Synergetic Operating Unit on NoC Layer for CMP System

    Coarse Grain Data Flow Graph (CGDFG) model based on message passing mechanism guides the parallel programming for the Chip Multi-Processor (CMP) system with distributed memory in the authors' work. Parallel threads are exploited, encapsulated in objects and mapped onto the different processors according to the CGDFG principles. Efficient scheduling and...

    Provided By Inderscience Enterprises

  • White Papers // Jul 2010

    On-Chip Implementation of Multiprocessor Networks and Switch Fabrics

    Future VLSI technology will enable hundreds, or even thousands, of Processing Elements (PEs) being integrated on the same chip. At the same time, Systems-on-Chip (SoCs) applications also demand higher data-processing capability that can perform parallel and multi-threading tasks. On-chip implementation of multiprocessor systems needs to planarise the interconnect networks onto...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2009

    Standards for Security Associations in Personal Networks: A Comparative Analysis

    Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. It is particularly challenging to make this process of associating devices easy-to-use, secure and inexpensive at the same time. A cornerstone of this process is key...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2009

    Learning Under Pressure: Learning Strategies, Workplace Climate, And Leadership Style In The Hospitality Industry

    In this paper, the authors explored the relationship among learning strategies, leadership style, and work environment for middle managers in the hospitality industry. They found an association between learning strategy and workplace climate; they also found an association with leadership style, but to a lesser extent. In the hospitality industry,...

    Provided By Inderscience Enterprises

  • White Papers // Jul 2009

    Structuring Dyadic Relationships Between Export Producers And Intermediaries

    How do export producers and intermediaries structure their dyadic relationships? This paper examines the factors that guide the behaviour and relationships between export producer and intermediary dyads. The authors examine both sides of a dyadic transaction and develop an export producer - intermediary behaviour typology by using a grounded theory...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2011

    Rendezvous Based Trust Propagation to Enhance Distributed Network Security

    Development of network of nodes connected with their trust values and the propagation of these trust values to far away nodes are basic operations of the modern day trustworthy networks. Trust can be exploited to mitigate the security threats in wireless network. Most of the existing trust propagation methods are...

    Provided By Inderscience Enterprises

  • White Papers // May 2009

    Cognitive Networking of Large Scale Wireless Systems

    The authors propose the concept of cognitive networking for large-scale wireless systems, which opportunistically utilises network resources including both spectrum bandwidth and radio availability. Both types of resources cannot be predetermined in large-scale wireless systems, due to various reasons such as interferences and dynamic traffic load. The proposed technology not...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2009

    Longitudinal Knowledge Strategizing In A Long-Term Healthcare Organisation

    Long-term healthcare organisations significantly benefit from Knowledge Management (KM). However, the extant literature has little empirical support for this statement. Using the KM instrument developed by Bontis and Fitz-enz (2002), this paper extends prior studies by evaluating behaviours within a not-for-profit context over several years. As such, it tests a...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2010

    Indoor GPS: System Functionality and Initial Performance Evaluation

    Indoor GPS (IGPS) is a newly developed laser based measuring system for large scale metrology. The relative portability, reconfigurability and ease of installation make the IGPS suitable for many industries manufacturing large scale products. The system performance depends on both the components characteristics and their physical configuration. Hence, an important...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2010

    Wireless Sensor Networks for Soil Science

    Wireless sensor networks can revolutionize soil ecology by providing measurements at temporal and spatial granularities previously impossible. This paper presents the authors' first steps towards fulfilling that goal by developing and deploying two experimental soil monitoring networks at urban forests in Baltimore, MD. The nodes of these networks periodically measure...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2011

    Mobile Multimedia in Wireless Sensor Networks

    One of the most referred and promising Wireless Sensor Network (WSN) applications is health monitoring. The small size and portability of nodes have made WSNs the perfect tool to easily monitor a person's health condition. In this type application, as well as in several other critical applications, reliability and mobility...

    Provided By Inderscience Enterprises

  • White Papers // Jun 2011

    Reliable Congestion-Aware Information Transport in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) constitute the transportation conduit for the results of the in-network processing of the raw data. In WSNs the sensor node and communication level perturbations are often the norm than the exception due to varied environmental conditions. Consequently, the diverse applications supported by WSNs stipulate their individual...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2010

    Efficient Predictive Monitoring of Wireless Sensor Networks

    Wireless Sensor Networks (WSN) are deployed to monitor physical events such as fire, or the state of physical objects such as bridges in order to support appropriate reaction to avoid potential damages. However, many situations require immediate attention or long reaction plan. Therefore, the classical approach of just detecting the...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2009

    Improving Mobile Target Detection on Randomly Deployed Sensor Networks

    This paper investigates the detection performance of randomly deployed wireless sensor networks. It addresses the problem of detecting mobile targets that have continuous movement. The authors categorise these targets into two classes. The first type is rational targets, which have the knowledge of existing sensors. The other type is on...

    Provided By Inderscience Enterprises

  • White Papers // Nov 2010

    A Survey on RFID Security and Provably Secure Grouping-Proof Protocols

    RFID security is a relatively new research area. Within less than a decade, a large number of research papers dealing with security issues of RFID technology have appeared. In the first part of this paper, the authors attempt to summarise current research in the field of RFID security and discuss...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2011

    Enhancing Lifetime of Wireless Sensor Networks Using Multiple Data Sinks

    In this paper, the authors address the fundamental question concerning the limits on the network lifetime in sensor networks when multiple Base Stations (BSs) are deployed as data sinks. Specifically, they derive upper bounds on the network lifetime when multiple BSs are employed, and obtain optimum locations of the base...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2008

    Reservation-Based Protocol for Monitoring Applications Using IEEE 802.15.4 Sensor Networks

    The IEEE 802.15.4 and Zigbee are protocols aimed at low-duty and low-power wireless sensor networks. Continuously monitoring applications such as applications of structural health monitoring could benefit from low power consumption of the IEEE 802.15.4 radio chips. However, existing implementation of IEEE 802.15.4 has limited applicability to 'Proactive', high-traffic monitoring...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2010

    Quality-Aware Sensor Data Collection

    Many sensor applications often require collecting raw sensed values from many sensor nodes to one centralised server. Sensor data collection typically comes with various quality requirements, e.g. the level of precision requested for temperature values, the time constraints for getting the data, or the percentage of data that is needed....

    Provided By Inderscience Enterprises

  • White Papers // Oct 2010

    Virtual ID: ID/Locator Split in a Mobile IP Environment for Mobility, Multihoming and Location Privacy for the Next Generation Wireless Networks

    Current networking protocols designed around single interface stationary end-systems clearly fail to represent the present communication context of mobile, multi-interface end-systems. Also, the convergence of wired and wireless technologies into an All-IP (AIP) next generation network will make available multiple diversified contexts that can be leveraged for better fault tolerance,...

    Provided By Inderscience Enterprises

  • White Papers // Nov 2008

    A Simple Performance Analysis of Rfid Networks With Binary Tree Collision Arbitration

    Radio Frequency IDentification (RFID) networks are becoming a widespread technology in industry and commerce. In this paper, the authors propose a simple performance analysis of RFID networks, based on the binary tree collision arbitration protocol. They evaluate various network performance metrics such as throughput, delay and average number of packets...

    Provided By Inderscience Enterprises

  • White Papers // Nov 2008

    A Lightweight Secure Architecture for Wireless Sensor Networks

    The adoption and widespread deployment of wireless sensor networks means that security issues are of critical concern. To date, much research has focused on the usability of these networks in a variety of environments where conventional wired networks may not be feasible. However, less emphasis was placed on the security...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2009

    Non-Linearity Effects and Predistortion in Optical OFDM Wireless Transmission Using LEDs

    Orthogonal Frequency Division Multiplexing (OFDM) is a promising technique to realise high-speed indoor Optical Wireless (OW) links through the exploitation of the high Peak-to-Average Power Ratio (PAPR) for Intensity Modulation (IM). However, the non-linear characteristic of a Light Emitting Diode (LED) imposes limitations on the performance. In this paper, the...

    Provided By Inderscience Enterprises

  • White Papers // Dec 2009

    Evaluation of Business Solutions in Manufacturing Enterprises

    Evaluating business solutions before being deployed is essential for any organization. Risk is emerging as one of the most preeminent and accepted metrics for the evaluations of business solutions. In this paper, the authors present a comprehensive case study where the Tropos Goal-Risk framework is used to assess and treat...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2007

    SMEs Funding: An Assessment of an Intervention Scheme in Nigeria

    This paper evaluates the impact of the Small and Medium Enterprises Equity Investment Scheme (SMEEIS) on the growth of Nigerian SMEs. Questionnaires and interviews were used to sample firms and commercial banks in Lagos, an industrially active environment. Uncoordinated business plans and poorly packaged projects were found to be the...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2012

    Process-Driven Biometric Identification by Means of Autonomic Grid Components

    Today's business applications are increasingly process driven, meaning that the main application logic is executed by a dedicate process engine. In addition, component-oriented software development has been attracting attention for building complex distributed applications. In this paper, the authors present the experiences gained from building a process-driven biometric identification application...

    Provided By Inderscience Enterprises

  • White Papers // Feb 2009

    Rule-Based Business Process Modelling and Enactment

    A Business Process Model is called rule-based if the logic of its control flow, data flow and resource allocation is declaratively expressed by means of business rules. Business rules are recognized as powerful representation forms that can potentially define the semantics of Business Process Models and business vocabulary. To date,...

    Provided By Inderscience Enterprises

  • White Papers // May 2007

    Ontology-Based Knowledge Networks for User Training in Business Process Management

    Successful business process design requires active participation of users who are familiar with organizational activities and business process modeling concepts. Hence, there is a need to provide users with reusable, flexible, agile and adaptable training material in order to enable them instil their knowledge and expertise in business process design...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2012

    Data Contracts for Cloud-based Data Marketplaces

    Currently, rich and diverse data types have been increasingly provided using the Data-as-a-Service (DaaS) model, a form of cloud computing services and the core element of data marketplaces. This facilitates the on-the-fly data composition and utilization for several data-intensive applications in e-science and business domains. However, data offered by DaaS...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2011

    Name-Based View Integration for Enhancing The Reusability in Process-Driven SOAs

    Many companies opt for reusing existing software development artefacts due to the benefits of the reuse such as increasing productivity, shortening time-to-market, and spending less time for testing, debugging, to name but a few. Unfortunately, reusing artefacts in existing process-driven SOA technologies is cumbersome and hard to achieve due to...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2008

    Using Process Mining to Learn from Process Changes in Evolutionary Systems

    Traditional information systems struggle with the requirement to provide flexibility and process support while still enforcing some degree of control. Accordingly, adaptive Process Management Systems (PMSs) have emerged that provide some flexibility by enabling dynamic process changes during runtime. Based on the assumption that these process changes are recorded explicitly,...

    Provided By Inderscience Enterprises

  • White Papers // Mar 2013

    A PLCS Framework for PDM/ERP Interoperabilty

    Wide diffusion of methodologies and software relevant to Product Lifecycle Management (PLM) in industrial companies faces heterogeneity of Information Technology (IT) systems. Especially, the lack of interoperability between Product Data Management (PDM) systems, that drive virtual product development, and Enterprise Resource Planning (ERP), which manages real product, cannot lead to...

    Provided By Inderscience Enterprises

  • White Papers // Jan 2012

    Integrated Service Engineering Workbench: Service Engineering for Digital Ecosystems

    The evolution of service-oriented architectures towards digital ecosystems comprehends a number of challenges. One challenge is to develop services in a dynamic environment with high uncertainties and in collaboration with other companies. Another challenge lies in how to describe services sufficiently for trading them in digital ecosystems. This paper explores...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2010

    Developing a Lean Design for Six Sigma Through Supply Chain Methodology

    The Six-Sigma systems can promote the enterprise competitive ability, such as pursuing cost improvement, promoting quality, the customer's satisfaction and valid strategy performance. This paper explored the synergies resulting from the combination of state-of-the art quality initiatives, lean and design for Six Sigma, and develop an integrated SCOR with lean...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2011

    A Rule-Based Approach to Model and Verify Flexible Business Processes

    Efficient organizations need to ensure that their business processes are flexible so that these processes can easily accommodate changes in regulations and policies. Appropriate techniques to model and verify these processes are required. In this paper, the authors present a rule-based approach, which is built upon the Event-Condition-Action model (ECA)...

    Provided By Inderscience Enterprises

  • White Papers // Jul 2008

    Privacy-Preserving Data Mining in the Malicious Model

    Most of the cryptographic work in privacy-preserving distributed data mining deals with semi-honest adversaries, which are assumed to follow the prescribed protocol but try to infer private information using the messages they receive during the protocol. Although the semi-honest model is reasonable in some cases, it is unrealistic to assume...

    Provided By Inderscience Enterprises

  • White Papers // Apr 2010

    A Novel Framework for Mobile Attack Strategy Modelling and Vulnerability Analysis in Wireless Ad Hoc Networks

    Global dissemination of information and tools for computer networks, has allowed for major system attacks affecting critical network points and resulting in significant network performance degradation. In this paper, the authors present a probabilistic modeling framework for the propagation of an energy-constrained mobile threat in a wireless ad hoc network....

    Provided By Inderscience Enterprises

  • White Papers // Jan 2007

    Detailed DoS Attacks in Wireless Networks and Countermeasures

    IEEE 802.11 wireless networks are one of the fastest growing network technologies. The users only need to have a mobile device with a wireless network adapter that negotiates with an access point or base station. Once authenticated and associated, the user can seamlessly roam within the coverage area of the...

    Provided By Inderscience Enterprises

  • White Papers // Jul 2013

    A Rough Set-Based Effective Rule Generation Method for Classification With an Application in Intrusion Detection

    In this paper, the authors use Rough Set Theory (RST) to address the important problem of generating decision rules for data mining. In particular, they propose a rough set-based approach to mine rules from inconsistent data. It computes the lower and upper approximations for each concept, and then builds concise...

    Provided By Inderscience Enterprises

  • White Papers // Oct 2008

    On the Relation Among Various Security Models for Certificateless Cryptography

    Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and security models currently hinders its progression as much effort has been put on refining the definitions and looking for an appropriate and practical security models....

    Provided By Inderscience Enterprises

  • White Papers // Dec 2008

    An Efficient One-move Nominative Signature Scheme

    A signer in a Nominative Signature (NS) scheme can arbitrarily choose a nominee, then jointly generate a signature in such a way that the signature can only be verified with the nominee's consent. NS is particularly useful in user certification systems. Currently, the only secure NS scheme available requires multi-round...

    Provided By Inderscience Enterprises

  • White Papers // Nov 2012

    Authenticating Strangers in Online Social Networks

    In current Online Social Networks (OSNs), it is necessary for a user to determine whether a claimed public key belongs to a target user. In this paper, the authors design a system to complete this task. They first find a common friend between two users and let her help to...

    Provided By Inderscience Enterprises

  • White Papers // Sep 2006

    Evaluating the Survivability of Intrusion Tolerant Database Systems and the Impact of Intrusion Detection Deficiencies

    The immaturity of current intrusion detection techniques limits traditional security mechanisms in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome these limitations. However, to what extent an intrusion tolerant system can mitigate detection deficiencies is still unknown. In this paper, first, the authors focus on quantifying suitable measures...

    Provided By Inderscience Enterprises