Institute of Electrical and Electronics Engineers

Displaying 1-40 of 7608 results

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Compatibility-Aware Cloud Service Composition Under Fuzzy Preferences

    When a single cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2013

    Constrained Pricing for Cloud Resource Allocation

    Constrained pricing in a cloud computing environment is addressed using game theory. The objective of the model and the game is to enable cloud providers to maximize their revenue while satisfying users by maximizing their utilities. The user's net utility is modeled as a function of resource demand with a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Advancements in Cloud Computing for Logistics

    The emergence of new cloud computing services is steadily increasing. More and more companies realize the benefits and opportunities of using IT-resources with unlimited scalability and on-demand services at pay per use conditions over the Internet, as opposed to \"Classical\" on-premise installation and operation. A recent survey of webhosting and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    IT Security Threats in Cloud Computing Sourcing Model

    New information technologies have been developing now-a-days at an amazing speed, affecting the functioning of organizations significantly. Due to the development of new technologies, especially mobile ones, borders in the functioning of modern organizations diminish and models of running business change. Almost all organizations are involved in some way in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Hardware Security Strategies Exploiting Nanoelectronic Circuits

    Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are Physical Unclonable Functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    The Security Onion Cloud Client: Network Security Monitoring for the Cloud

    With \"Cloud\" servers continuing to become ever more popular, along with typical off-site servers (VPS/Dedicated), Network Security Monitoring (NSM) practitioners struggle to gain insight into these devices, as they usually don't have the ability to tap the network traffic flowing to and from the servers - To solve this problem,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Design and Implementation of Digital Signatures

    Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement. A VLSI implementation of the digital signature scheme is proposed in this paper, for efficient usage in any cryptographic protocol. This architecture is based on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    On the Quality of Service of Cloud Gaming Systems

    Cloud gaming, i.e., real-time game playing via thin clients, relieves users from being forced to upgrade their computers and resolve the incompatibility issues between games and computers. As a result, cloud gaming is generating a great deal of interests among entrepreneurs, venture capitalists, general public's, and researchers. However, given the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks

    A Wireless Sensor Network (WSN) commonly requires lower level security for public information gathering, whilst a Body Sensor Network (BSN) must be secured with strong authenticity to protect personal health information. In this paper, some practical problems with the Message Authentication Codes (MACs), which were proposed in the popular security...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    On Service Migration in the Cloud to Facilitate Mobile Accesses

    Using service migration in clouds to satisfy a sequence of mobile batch-request demands is a popular solution to enhanced QoS and cost effectiveness. As the origins of the mobile accesses are frequently changed over time, moving services closer to client locations not only reduces the service access latency but also...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach

    In this paper, the authors propose a service-aware approach to enhance survivability in virtualized data centers. The idea is to create and maintain a Survivable Virtual Infrastructure (SVI) for each service or tenant, which includes Virtual Machines (VMs) hosting the corresponding application and their backup VMs. A fundamental problem is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Near Field Authentication for Smart Devices

    Near Field Communication (NFC) systems provide a good location-limited channel so that many security systems can use it to force the participants to stay close to each other. Unfortunately, only a small number of smart devices in the market are equipped with NFC chips that are essential for NFC systems....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Data On-Boarding in Federated Storage Clouds

    One of the main obstacles hindering wider adoption of storage cloud services is vendor lock-in, a situation in which large amounts of data that are placed in one storage system cannot be migrated to another vendor, e.g., due to time and cost considerations. In this paper, the authors present an...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Cloud Computing : The Dark side

    The Rapid growth of data has turned out to be a very unstable for the cloud vendors. Such bulky data is very difficult to handle and protect from malicious hackers. Lack of security is the major problem to overcome in wide adoption of cloud computing and networking. The amount of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Review of Agent Oriented Technology in Cloud Node Application

    Cloud computing provides virtualized resources and scalable infrastructure in the form of services over the Internet. It is a model for enabling demand network access to a shared pool of computing resources. Cloud infrastructure is implemented on virtual machines which are remotely located. Any user who wants to access his...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Synchronous Physical-Layer Network Coding: A Feasibility Study

    Recently, Physical-layer Network Coding (PNC) attracts much attention due to its ability to improve throughput in relay-aided communications. However, the implementation of PNC is still a work in progress, and synchronization is a significant and difficult issue. This paper investigates the feasibility of synchronous PNC with M-ary Quadrature Amplitude Modulation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Enabling DUI Systems in Handheld Devices Using Cloud

    Application distribution among Mobile devices through cloud. Cloud computing support for energy saving, privacy, security, data protection, and fast exchange of data over the internet currently, application can't scale over multiple Cloud Computing Service Providers. Since there is no interoperability between Cloud Computing Service Providers due to device interoperability it's...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    The Second-Order Coding Rate of the MIMO Rayleigh Block-Fading Channel

    The authors study the second-order coding rate of the Multiple-Input Multiple-Output (MIMO) Rayleigh block-fading channel via statistical bounds from information spectrum methods and Gaussian tools from random matrix theory. A Gaussian approximation is then used to establish an upper bound on the error probability for arbitrary code rates which is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Business and IT Alignment with SEAM for Enterprise Architecture

    To align an IT system with an organization's needs, it is necessary to understand the organization's position within its environment as well as its internal configuration. In SEAM for Enterprise Architecture the organization is considered as a hierarchy of systems that span from business down to IT. The alignment process...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Auditing for Distributed Storage Systems

    In this paper, the authors bridge the gap between these two currently disconnected bodies of work. They propose NC-Audit, a novel remote data integrity checking scheme, designed specifically for network coding-based distributed storage systems. NC-Audit combines, for the first time, the following desired properties: efficient checking of data integrity, efficient...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS

    Distributed control algorithms (e.g., consensus algorithms) are vulnerable to the misbehaving agent compromised by cyber attacks in the Distributed Networked Control Systems (DNCS). In this paper, the authors continue their work on a proposed secure distributed control methodology that is capable of performing a secure consensus computation in D-NCS in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    TCP and Network Coding Equilibrium and Dynamic Properties

    In this paper, the authors analyze the impact on the TCP-Reno congestion control mechanism of a Network Coding (NC) layer inserted in the TCP/IP stack. A multi-source multi-link model is considered to study the equilibrium and dynamic properties of the TCP-NC protocol with RED as active queue management mechanism. The...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Achieving Maximum Energy-Efficiency in Multi-Relay OFDMA Cellular Networks: A Fractional Programming Approach

    In this paper, the joint power and subcarrier allocation problem is solved in the context of maximizing the Energy-Efficiency (EE) of a multi-user, multi-relay Orthogonal Frequency Division Multiple Access (OFDMA) cellular network, where the objective function is formulated as the ratio of the Spectral-Efficiency (SE) over the total power dissipation....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Guest Editors' Introduction: Special Issue on Cloud Computing

    Cloud is a novel computing paradigm that builds on the foundations of distributed computing, grid computing, networking, virtualization, service orientation, and marketoriented computing. Cloud provides flexible resource allocation on demand with the promise of realizing elastic, Internet-accessible computing on a pay-as-you-go basis. Cloud services include infrastructure such as computing and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Communication over Finite-Chain-Ring Matrix Channels

    Though network coding is traditionally performed over finite fields, recent work on nested-lattice-based network coding suggests that, by allowing network coding over finite chain rings, more efficient physical-layer network coding schemes can be constructed. This paper considers the problem of communication over the finite-chain-ring matrix channel Y = AX +...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Denial Attacks in Cloud Computing

    Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end-recipients. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagram. The authors are aimed at implement the denial...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    The Role of Cloud Computing in Mobile

    The mobile cloud computing approach has emerged as a promising way to address the new challenges in the application development and implementation of resources sharing or distributed computing. The capabilities of mobile devices have been improving quickly than computers. Many researchers focus on the area of mobile computing and cloud...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    A Novel Approach for Preventing Hackers in Data Communication

    In the electronic communication system the user authentication is an important issue to be considered for the information security. The concept of username with password is an efficient method of maintaining shared secret information between a user and a remote system. Any communication through the internet passes across an unsecured...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel Underlay TV Spectrum Sharing Scheme Based On Polarization Adaption for TD-LTE System

    Spectrum opportunities in time, space and power domain are exploited by secondary users in traditional Cognitive Radio studies. While spectrum opportunities in polarization domain, namely simultaneous utilization of spectrum between primary and secondary system with polarization signal characteristics, is exploited inadequately. With the merits of polarization mismatch, primary system lies...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Opportunistic and Efficient Resource Block Allocation Algorithms for LTE Uplink Networks

    In this paper, the authors propose two new Resource Block (RB) allocation algorithms for the LTE uplink. They take into account the RB adjacency constraint and update the allocation metric. Two different heuristics are proposed: an Opportunistic and Efficient RB allocation Algorithm (OEA) and a Quality of Service based Opportunistic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel UHF RFID Dual-Band Tag Antenna with Inductively Coupled Feed Structure

    A dual-band tag antenna for UHF RFID systems is proposed. The tag antenna is composed of a zigzag main body and a zigzag loop, which is an inductively coupled feed structure antenna. The proposed structure is simple, which is not only easy to adjust the matching impedance but also to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Dynamic Resource Allocation for Machine-Type Communications in LTE/LTE-A with Contention-Based Access

    In this paper, the authors propose a dynamic resource allocation method to enable efficient and low-latency Machine Type Communications (MTC) in LTE/LTE-A with the Contention Based random Access (CBA) scheme. In the proposed method, they firstly estimate the probabilities of events caused by a CBA transmission and then calculate the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Reliable Throughput for Two-way Relay Systems by Network Coding

    The throughput of wireless network can be improved by wireless network coding, without adding additional resources. However, most of the previous work focuses on the AWGN channel. In fact, the signal is subject to severe fading over wireless channel. The network coding reliable throughput of two-way system under Rayleigh fading...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding Based Reliable Broadcast Protocol in Multi-Channel Multi-Radio Wireless Mesh Networks

    Multi-Channel Multi-Radio (MCMR) Wireless Mesh Networks (WMNs) have emerged as a new paradigm in multi-hop wireless networks. In a typical MCMR WMNs, each node has multiple radios with multiple available channels on each radio, which allows nodes to have simultaneous transmissions and receptions. Therefore, network performance is improved. As a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Group-Wise Channel Sensing and Resource Pre-Allocation for LTE D2D on ISM Band

    Device-To-Device communication has been regarded as a promising technology to improve the cellular system efficiency, which allows mobile devices communicate directly with each other on the licensed frequency resources under the control of a base station (or eNB). However, the benefits of D2D using license exempt bands, such as ISM...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Contention-Vector Based Hybrid Scheduling Algorithm for Wireless Networks

    A good scheduling algorithm in wireless networks is the key for the efficient use of wireless medium. This paper presents a hybrid scheduling algorithm, called Contention-Vector based Hybrid Scheduling (CVHS) algorithm, for wireless networks wherein stations can sense each other. Examples of such wireless networks include Wireless LANs and small...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding with Remix Qualification for Multicasting in Delay-Tolerant Networks

    In delay-tolerant networks where connectivity between nodes is intermittent, replication-based delivery mechanisms are often employed to deliver messages in a store-carry-forward manner instead of end-to-end delivery techniques that are mainly used in traditional computer networks and Mobile Ad-hoc NETworks. However, multicasting with replication-based methodologies can induce considerable message traffic and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Wideband MIMO Channel Capacity Analysis Based on Indoor Channel Measurement

    Based on the channel measurement in a typical indoor environment, wideband Multi-Input Multi-Output (MIMO) channel capacity analysis result is reported in this paper. A series of Non Line-Of-Sight (NLOS) and LOS measurement positions are planned for capacity comparison in different propagation conditions. For fixed received Signal-to-Noise Ratio (SNR), slight average...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Interference-Aware Graph Based Resource Sharing for Device-to-Device Communications Underlaying Cellular Networks

    Device-To-Device (D2D) communications underlaying cellular networks have recently been considered as a promising means to improve the resource utilization of the cellular network and the user throughput between devices in proximity to each other. In this paper, the authors investigate the resource sharing problem to optimize the system performance in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2011

    A Secure Energy Routing Mechanism for Sharing Renewable Energy in Smart Microgrid

    Due to volatile and rising energy prices, smart microgrids appear to be increasingly popular. Instead of one centrally located power plant, the microgrids will rely on solar panels and wind turbines on every house sharing renewable energy among houses. How to efficiently and optimally share energy is a challenging problem....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2006

    Survey on Security Challenges as Related to Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is confronted with many security challenges. Their wireless nature and ever increasing range of usage present many unique challenges to designers of security mechanisms and protocols for WSN's. While the security practices employed in more traditional wired networks have been scrutinized and enhanced for years, the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2010

    Secure Abstraction Views for Scientific Workflow Provenance Querying

    Provenance management has become increasingly important in the areas of services computing and scientific workflows. Provenance has become increasingly important in scientific workflows and services computing to capture the derivation history of a data product, including the original data sources, intermediate data products, and the steps that were applied to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Business Process Personalization Through Web Widgets

    Widget aggregators such as iGoogle and Netvibes are broadly adopted by the mass market. They enable end-users to personalize their environment with their preferred services (Widgets). However, the usage in an enterprise context is not yet investigated. In this paper, the authors firstly show that in addition to personalization capability,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2006

    An Introductory Overview and Survey of Business-Driven IT Management

    Business-Driven IT Management (BDIM) is a new, evolutionary and comprehensive IT management approach that aims to improve IT infrastructure, service quality and business results at the same time. To that end, it needs to model and numerically estimate IT-business linkage. BDIM concepts are finding ways into ITIL-based management processes as...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2006

    Classifying Business Processes for Domain Engineering

    Enterprises build information systems to support their business processes. Some of those business processes are industry or enterprise-specific, but most are common to many industries and are used, modulo a few modifications, in different contexts. To the extent that the authors can, decompose complex business processes into composable generic sub-processes,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2011

    Enterprise Systems: State-of-the-Art and Future Trends

    Rapid advances in industrial information integration methods have spurred tremendous growth in the use of enterprise systems. Consequently, a variety of techniques have been used for probing enterprise systems. These techniques include business process management, workflow management, Enterprise Application Integration (EAI), Service-Oriented Architecture (SOA), grid computing, and others. Many applications...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2012

    From Business Process Modeling to Data Model: A Systematic Approach

    Business process modeling and management approaches are increasingly used and disclosed between organizations as a means of optimizing and streamlining the business activities. Among the various existing modeling languages, the authors stress the Business Process Model and Notation (BPMN), currently in version 2.0. BPMN is a widespread OMG standard that...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2007

    Formal Verification of Business Workflows and Role Based Access Control Systems

    Role Based Access Control (RBAC) is an increasingly popular and efficient security solution. An approach for combined modeling of Role-Based Access Control systems (RBAC) together with business workflows is presented. The model allows to model check various security properties. Several techniques to confine the state explosion, which may occur during...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Business and IT Alignment with SEAM for Enterprise Architecture

    To align an IT system with an organization's needs, it is necessary to understand the organization's position within its environment as well as its internal configuration. In SEAM for Enterprise Architecture the organization is considered as a hierarchy of systems that span from business down to IT. The alignment process...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2007

    A Research Agenda for Autonomous Business Process Management

    Fast changing requirements, regarding different types of resources such as personnel or IT-systems, require companies to adapt their business processes in a very agile but yet sophisticated way. Most of today's companies fail in accomplishing this goal because of too static business process analysis and management approaches. The Autonomous Business...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2012

    SecEPM: A Security Engineering Process Model for Electronic Business Processes

    Business Process Management (BPM) and accompanying systems allow organizations to react faster both to environmental and market changes. Therefore, BPM is widely applied in industry. Although organizations depend on the secure enactment of electronic business processes, existing BPM languages and techniques provide only little support for security. Several approaches have...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    The Perspective of Business Process Outsourcing in Slovenian Organizations

    Business Process Management (BPM) and Business Process Outsourcing (BPO) play an important role in organizations helping them ensure competitiveness and competitive advantages and increase efficiency and effectiveness. The authors' paper analyzes the role of outsourcing in Slovenian organizations. Data was obtained through a survey and interpreted with descriptive statistics, frequency...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2008

    Multiservice Home Gateways: Business Model, Execution Environment, Management Infrastructure

    The home gateway market is undergoing deep changes. On one side, home networks are evolving, getting dynamic and federating more and more devices. On the WAN side, new actors appear, such as multimedia content providers. From both sides emerge new features and new management needs. In this paper, the authors...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2011

    Data Access Exception Detecting of WS-BPEL Process Based on Workflow Nets

    The current workflow nets models of WS-BPEL are feature completed, but almost all of them lack data information, so they cannot be used to detect the data access exception in WSBPEL. In order to overcome this shortcoming, this paper presents a new type of Petri nets - DWFN (Data WorkFlow...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2007

    Dynamic Device and Service Discovery Extensions for WS-BPEL

    Process management systems reveal the full potential of Service Oriented Architectures by composing heterogeneous hardware and software components (exposed as services) to powerful distributed applications. For web services architectures, the Web Services Business Process Execution Language (WSBPEL) is the standard for centralized Web service orchestration which is governed by OASIS....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Business Process Based Simulation: A Powerful Tool for Demand Analysis of Business Process Reengineering and Information System Implementation

    Demand analysis is of fundamentally importance in the implementation of information system. Business process Reengineering (BPR) often gets involved in the process of demand analysis and plays a crucial role in the achievement of project objectives. Business Process based Simulation (BPS) provides a precise and visual method to analyze and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2011

    Enterprise Simulation - A Practical Application in Business Planning

    Modeling and simulation (which the authors will refer to as simply \"Modeling\" in this paper) is an essential process in modern business management. The Vanguard System is Web-based collaborative modeling software for enterprise simulation and business planning. It supports proactive decision-making, resource optimization, and strategic planning using a number of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2011

    Simulation Standard for Business Process Management

    Simulation is considered a key component for business process management suites. Within business process management, simulation can be readily used for both process design, and ongoing improvement. Despite the predictive capabilities of simulation, the lack of wide scale adoption within business process management compared with what might be expected suggests...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2012

    Hint-Based Execution of Workloads in Clouds With Nefeli

    Infrastructure-as-a-service clouds offer entire virtual infrastructures for distributed processing while concealing all physical underlying machinery. Current cloud interface abstractions restrict users from providing information regarding usage patterns of their requested Virtual Machines (VMs). In this paper, the authors propose Nefeli, a virtual infrastructure gateway that lifts this restriction. Through Nefeli,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2008

    Design and Implementation of the POWER6 Microprocessor

    The IBM POWER6 processor is a dual-core, 341 mm (2); 790 million transistor chips fabricated using IBM's 65 nm partially-depleted SOI process. Capable of running at frequencies up to 5GHz in high performance applications, it can also operate under 100W for power-sensitive applications. Traditional power-intensive and deep-pipelining techniques used in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2009

    StoRM: A Flexible Solution for Storage Resource Manager in Grid

    In these times, scientific data intensive applications generate ever-increasing volumes of data that need to be stored, managed, and shared between geographically distributed communities. Datacenters are normally able to provide tens of petabytes of storage space through a large variety of heterogeneous storage and file systems. However, storage systems shared...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2007

    RFID Security Issues in Military Supply Chains

    Radio Frequency IDentification (RFID) technologies have been used by the military to gain in-transit visibility and improve inventory management. The advantages of using RFID to track assets over using barcode have been broadly recognized. However, recent research has proven that RFID is vulnerable to attacks. This brings a challenge at...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    The Role of Cloud Computing in Mobile

    The mobile cloud computing approach has emerged as a promising way to address the new challenges in the application development and implementation of resources sharing or distributed computing. The capabilities of mobile devices have been improving quickly than computers. Many researchers focus on the area of mobile computing and cloud...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Review of Agent Oriented Technology in Cloud Node Application

    Cloud computing provides virtualized resources and scalable infrastructure in the form of services over the Internet. It is a model for enabling demand network access to a shared pool of computing resources. Cloud infrastructure is implemented on virtual machines which are remotely located. Any user who wants to access his...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2006

    Combining Crypto with Biometrics Effectively

    The authors propose the first practical and secure way to integrate the iris biometric into cryptographic applications. A repeatable binary string, which they call a biometric key, is generated reliably from genuine iris codes. A well-known difficulty has been how to cope with the 10 to 20 percent of error...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2008

    A Novel Protocol for Smart Card Using ECDLP

    In this paper, the authors propose a novel protocol for smart card based on Elliptic Curve Discrete Logarithm Problem (ECDLP). They believe that applications of smart card technology should be benefited more from advantages of public key cryptography, specifically, in initiation and maintenance of secure channel. This paper introduces a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Enabling DUI Systems in Handheld Devices Using Cloud

    Application distribution among Mobile devices through cloud. Cloud computing support for energy saving, privacy, security, data protection, and fast exchange of data over the internet currently, application can't scale over multiple Cloud Computing Service Providers. Since there is no interoperability between Cloud Computing Service Providers due to device interoperability it's...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2011

    What are You Paying for? Performance Benchmarking for Infrastructure-as-a-Service Offerings

    As part of the Cloud Computing stack, Infrastructure-as-a-Service (IaaS) offerings become more and more widespread. They allow users to deploy and run virtual machines in remote data centers (the Cloud), paying by use. However, performance specifications for virtual machines provided by providers are not coherent and sometimes not even sufficient...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Design and Implementation of Digital Signatures

    Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement. A VLSI implementation of the digital signature scheme is proposed in this paper, for efficient usage in any cryptographic protocol. This architecture is based on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    A Survey on Security for Mobile Devices

    Now-a-days, mobile devices are an important part of the authors' everyday lives since they enable the users to access a large variety of ubiquitous services. In recent years, the availability of these ubiquitous and mobile services has significantly increased due to the different form of connectivity provided by mobile devices,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    A New Convergent Identity System Based on EAP-TLS Smart Cards

    In this paper, the authors present a new identity system, named SSL-Identity, working with EAP-TLS smart cards. It details an innovative technology based on tiny SSL stacks deployed in billions of such devices embedded in USB dongles or mobile phones, and comments first experimental results. SSL-Identity is convergent because it...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2006

    Could IPv6 Improve Network Security? And, if So, at What Cost?

    Industry stakeholders and Internet experts generally agree that IPv6-based networks in many ways would be technically superior to IPv4-based networks. The redesigned header structure in IPv6, including new flow labels, and the enhanced capabilities of the new protocol could provide significant security benefits to Internet users, network administrators, and applications...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Transmission Network Planning Under Security and Environmental Constraints

    This paper has addressed the effect of variations CO2 in emission allowances price on transmission network planning. The transmission network planning problem was formulated as a mixed-integer optimization problem so as to model the lumpy nature of transmission investment. As losses are important in transmission network planning, an accurate linear...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2012

    Cloud Security Issues

    In past three decades, the world of computation has changed from centralized (client-server not web-based) to distributed systems and now the authors are getting back to the virtual centralization (Cloud Computing). Location of data and processes makes the difference in the realm of computation. On one hand, an individual has...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    SciCumulus: A Lightweight Cloud Middleware to Explore Many Task Computing Paradigm in Scientific Workflows

    Most of the large-scale scientific experiments modeled as scientific workflows produce a large amount of data and require workflow parallelism to reduce workflow execution time. Some of the existing Scientific Workflow Management Systems (SWfMS) explore parallelism techniques - such as parameter sweep and data fragmentation. In those systems, several computing...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2012

    From Mobiles to Clouds: Developing Energy-Aware Offloading Strategies for Workflows

    Cloud computing and mobile computing is two of the most influential technologies that look set to change the face of computing in the coming years. Combination of the two provides the user with an unprecedented opportunity to provide highly portable and yet content-rich and computation-intensive services to the end user....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2013

    Sharing-Aware Cloud-Based Mobile Outsourcing

    Mobile devices, such as smart phones and tablets, are becoming the universal interface to online services and applications. However, such devices have limited computational power and battery life, which limits their ability to execute resource-intensive applications. Computation outsourcing to external resources has been proposed as a technique to alleviate this...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2013

    DNS Update Extension to IPv6 Secure Addressing

    The Domain Name System (DNS) is a primary component of the Internet. It was for this reason that a DNS update mechanism was created and implemented giving hosts the ability to dynamically change DNS entries. But this new mechanism exposed DNS servers to new security vulnerabilities so some security protocols...

    Provided By Institute of Electrical and Electronics Engineers