International Federation for Information Processing

Displaying 1-40 of 64 results

  • White Papers // Oct 2013

    Leveraging Attention Scarcity to Improve the Overall User Experience of Cloud Services

    Applications for mobile devices are increasingly relying on cloud services to provide content and offload data processing tasks. Traditionally, web-based systems have been optimized to improve response time. Touch sensitive screens and the various sensors of mobile devices allow for better instrumentation, enabling providers to obtain more honest signals on...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2013

    SAVI Testbed: Control and Management of Converged Virtual ICT Resources

    In this paper the authors introduce the SAVI testbed for control and management of converged virtual ICT resources. The SAVI testbed attempts to create an open applications marketplace that operates on converged virtual computing and networking infrastructures and supports experimentation with emerging Future Internet protocols and applications. In this paper...

    Provided By International Federation for Information Processing

  • White Papers // May 2013

    Throughput Regions and Optimal Policies in Wireless Networks With Opportunistic Routing

    Opportunistic routing in wireless networks has been proposed as a method to combat the volatility of wireless links, by leveraging their broadcast nature and choosing the next hop for each transmitted packet post-facto, using the actual reception outcomes at the respective neighbors, rather than based on a priori information. Much...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2012

    SOFTScale: Stealing Opportunistically for Transient Scaling

    Dynamic capacity provisioning is a well studied approach to handling gradual changes in data center load. However, abrupt spikes in load are still problematic in that the work in the system rises very quickly during the setup time needed to turn on additional capacity. Performance can be severely affected even...

    Provided By International Federation for Information Processing

  • White Papers // Sep 2012

    Mappings From BPEL to PMR for Business Process Registration

    In order to facilitate business collaboration and interoperation in virtual enterprises, it is crucial to discover appropriate business processes modeled in different languages and stored in different repositories. For this purpose, it is more efficient to register existent process models into a common process model registry, rather than defining numerous...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2012

    An Architecture for Overlaying Private Clouds on Public Providers

    Organizations shifting to a public cloud infrastructure face potential hurdles regarding control and security, and must acquire a new set of best practices regarding developing and deploying to a cloud infrastructure. The authors propose a reference architecture for a virtual private cloud built on cross-provider on-demand compute instances, with a...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2012

    A Taxonomy of Dirty Time-Oriented Data

    Data quality is a vital topic for business analytics in order to gain accurate insight and make correct decisions in many data-intensive industries. Albeit systematic approaches to categorize, detect, and avoid data quality problems exist, the special characteristics of time-oriented data are hardly considered. However, time is an important data...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2012

    Implementation and Evaluation of Coupled Congestion Control for Multipath TCP

    Multipath TCP (MPTCP) is an experimental protocol currently under standardization in the IETF. MPTCP allows to use multiple TCP connections for one data transmission if at least one of the endpoints is multi-homed. For example, this can be a mobile device with a Wi-Fi and a 3G interface. It is...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2012

    Statelets: Coordination of Social Collaboration Processes

    Today people work together across time, space, cultural and organizational boundaries. To simplify and automate the work, collaboration employs a broad range of tools, such as project management software, groupware, social networking services, or wikis. For a collaboration to be effective, the actions of collaborators need to be properly coordinated,...

    Provided By International Federation for Information Processing

  • White Papers // Jun 2012

    ROAC: A Role-Oriented Access Control Model

    Role-Based Access Control (RBAC) has become the de facto standard for realizing authorization requirements in a wide range of organizations. Existing RBAC models suffer from two main shortcomings; lack of expressiveness of roles/permissions and ambiguities of their hierarchies. Roles/permissions expressiveness is limited since roles do not have the ability to...

    Provided By International Federation for Information Processing

  • White Papers // May 2012

    Remedy: Network-Aware Steady State VM Management for Data Centers

    Steady state VM-management in data centers should be network-aware so that VM migrations do not degrade network performance of other flows in the network, and if required, a VM migration can be intelligently orchestrated to decongest a network hotspot. Recent research in network-aware management of VMs has focused mainly on...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2012

    Migrating a Legacy Web-Based Document-Analysis Application to Hadoop and HBase: An Experience Report

    Migrating a legacy application to a more modern computing platform is a recurring software-development activity. This paper describes the authors' experience with a contemporary rendition of this activity, migrating a web-based system to a service-oriented application on two different cloud software platforms, Hadoop and HBase. Using the case study as...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2012

    HyperForce: Hypervisor-enForced Execution of Security-Critical Code

    The sustained popularity of the cloud and cloud-related services accelerate the evolution of virtualization-enabling technologies. Modern off-the-shelf computers are already equipped with specialized hardware that enables a hypervisor to manage the simultaneous execution of multiple operating systems. Researchers have proposed security mechanisms that operate within such a hypervisor to protect...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2012

    Secure Client Puzzles Based on Random Beacons

    Denial of Service (DoS) attacks pose a fast-growing threat to network services in the Internet, but also corporate Intranets and public local area networks like Wi-Fi hotspots may be affected. Especially protocols that perform authentication and key exchange relying on expensive public key cryptography are likely to be preferred targets....

    Provided By International Federation for Information Processing

  • White Papers // Mar 2012

    Trust Model for Optimized Cloud Services

    Cloud computing with its inherent advantages draws attention for business critical applications, but concurrently expects high level of trust in cloud service providers. Reputation-based trust is emerging as a good choice to model trust of cloud service providers based on available evidence. Many existing reputation based systems either ignore or...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2011

    Contrail: Enabling Decentralized Social Networks on Smartphones

    Mobile devices are increasingly used for social networking applications, where data is shared between devices belonging to different users. Today, such applications are implemented as centralized services, forcing users to trust corporations with their personal data. While decentralized designs for such applications can provide privacy, they are difficult to achieve...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2011

    A Middleware Layer for Flexible and Cost-Efficient Multi-Tenant Applications

    Application-level multi-tenancy is an architectural design principle for Software-as-a-Service applications to enable the hosting of multiple customers (or tenants) by a single application instance. Despite the operational cost and maintenance benefits of application-level multi-tenancy, the current middleware component models for multi-tenant application design are inflexible with respect to providing different...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2011

    Observations on e-Business Implementation Capabilities in Heterogeneous Business Networks

    This paper was to understand the factors that hinder large industry organizations in implementing e-Business solutions. The study included 4 organizations that operated in heterogeneous business networks consisting also of small partners. Interviews were conducted with managers of IT, purchasing and business development. The results indicate that the organizations faced...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2011

    An Efficient Architectural Design of Hardware Interface for Heterogeneous Multi-Core System

    How to manage the message passing among inter processor cores with lower overhead is a great challenge when the multi-core system is the contemporary solution to satisfy high performance and low energy demands in general and embedded computing domains. Generally speaking, the Network-on-Chip (NoCs) connects the distributed multi-core system. It...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2011

    Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System

    Traditional Identification-centric RFID System (IRS) is designed to provide services of object identification/tracing/locating, but it has some shortcomings when encountering a dynamic environment in which the status of the systems and the service requirements of users/objects may change continuously. Very recently a new Code-centric RFID System (CRS), which is far...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2011

    Stabilized Edge-to-Edge Aggregate Flow Control

    In this paper, the authors present a distributed flow control scheme which achieves weighted max-min fair bandwidth allocation among all source-destination pairs on a per-aggregate basis within its network. The motivation behind the scheme is the absence of per-aggregate flow control in the current Internet, resulting in inability to enforce...

    Provided By International Federation for Information Processing

  • White Papers // Jun 2011

    Multiparty Authorization Framework for Data Sharing in Online Social Networks

    Online Social Networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractive means for digital social interactions and information sharing, but also raise a number of security and privacy issues. While OSNs allow users...

    Provided By International Federation for Information Processing

  • White Papers // May 2011

    On the Uplink Performance of TCP in Multi-Rate 802.11 WLANs

    IEEE 802.11 defines several physical layer data rates to provide more robust communication by falling back to a lower rate in the presence of high noise levels. The choice of the current rate can be automatized; e.g., Auto-Rate Fallback (ARF) is a well-known mechanism in which the sender adapts its...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    A Deep Dive Into the LISP Cache and What ISPs Should Know About It

    Due to scalability issues that the current Internet is facing, the research community has re-discovered the locator/ID split paradigm. As the name suggests, this paradigm is based on the idea of separating the identity from the location of end-systems, in order to increase the scalability of the Internet architecture. One...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    VMFlow: Leveraging VM Mobility to Reduce Network Power Costs in Data Centers

    Networking costs play an important role in the overall costs of a modern data center. Network power, for example, has been estimated at 10-20% of the overall data center power consumption. Traditional power saving techniques in data centers focus on server power reduction through Virtual Machine (VM) migration and server...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    A Novel Scalable IPv6 Lookup Scheme Using Compressed Pipelined Tries

    An IP router has to match each incoming packet's IP destination address against all stored prefixes in its forwarding table. This task is increasingly more challenging as the routers have to: not only keep up with the ultra-high link speeds, but also be ready to switch to the 128-bit IPv6...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    Autonomic Management for Personalized Handover Decisions in Heterogeneous Wireless Networks

    The computation of good and optimal handover decisions is a significant problem in a heterogeneous network environment. This is exacerbated when the goal is to provide personalized services for mobile users as opposed to generic device metrics such as received signal strength. Personalized handover decisions should not only consider received...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    Improving the Scalability of Cloud-Based Resilient Database Servers

    Many rely now on public cloud infrastructure-as-a-service for database servers, mainly, by pushing the limits of existing pooling and replication software to operate large shared-nothing virtual server clusters. Yet, it is unclear whether this is still the best architectural choice, namely, when cloud infrastructure provides seamless virtual shared storage and...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2010

    Multi-Agent Topologies Over WSANs in the Context of Fault Tolerant Supervision

    Wireless Sensor and Actuator Networks (WSANs) has attracted considerable attention in the last few years. They are distributed networks of sensors and actuators nodes, which act together in order to monitor and/or control a diversity of physical environments. Each node is a small electronic device with wireless communication capabilities, including...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2010

    Enterprise Modeling for Business Intelligence

    Business Intelligence (BI) software aims to enable business users to easily access and analyze relevant enterprise information so that they can make timely and fact-based decisions. However, despite user friendly features such as dashboards and other visualizations, business users still find BI software hard to use and inflexible for their...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2010

    Interactive Goal Model Analysis Applied - Systematic Procedures Versus Ad Hoc Analysis

    Intentional modeling, capturing the goals of stakeholders, has been proposed as a means of early system elicitation and design for an enterprise, focusing on social and strategic requirements. It is often assumed that more utility can be gained from goal models by applying explicit analysis over models, but little work...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2010

    Kevlar: A Flexible Infrastructure for Wide-Area Collaborative Applications

    While web services ensure interoperability and extensibility for networked applications, they also complicate the deployment of highly collaborative systems, such as virtual reality environments and massively multiplayer online games. Quite simply, such systems often manifest a natural peer-to-peer structure. This conflicts with web services' imposition of a client-server communication model,...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2010

    Distributed and Secure Access Control in P2P Databases

    The intent of Peer Data Management Systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to restrict the access to authorized parties. In this paper, the authors study a distributed access control model, where data items are stored,...

    Provided By International Federation for Information Processing

  • White Papers // Jun 2010

    Towards a P2P-Based Deployment of Network Management Information

    Standard static centralized network management approaches are unsuitable for managing large, dynamic and distributed networks. Some decentralized approaches based on the P2P model have emerged to overcome the limitations of these centralized approaches like lack of scalability and fault-tolerance. However, the authors do not address issues related to the deployment...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Multicast in Multi-Channel Wireless Mesh Networks

    The authors study high-throughput multicast solutions for Wireless Mesh Networks (WMN). Two techniques in WMN design are considered for combating wireless bandwidth limitations and wireless interference, respectively: introducing multiple mesh gateways and exploiting the diversity of wireless channels. They target a cross-layer solution that jointly selects appropriate channels for each...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Survivable Virtual Network Embedding

    Network virtualization can offer more flexibility and better manageability for the future Internet by allowing multiple heterogeneous Virtual Networks (VN) to coexist on a shared Infrastructure Provider (InP) network. A major challenge in this respect is the VN embedding problem that deals with the efficient mapping of virtual resources on...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Dynamic Service Placement in Shared Service Hosting Infrastructures

    Large-scale shared service hosting environments, such as content delivery networks and cloud computing, have gained much popularity in recent years. A key challenge faced by service owners in these environments is to determine the locations where service instances (e.g. virtual machine instances) should be placed such that the hosting cost...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Towards Vulnerability Prevention in Autonomic Networks and Systems

    The autonomic paradigm has been introduced in order to cope with the growing complexity of management. In that context, autonomic networks and systems are in charge of their own configuration. However, the changes that are operated by these environments may generate vulnerable configurations. In the meantime, a strong standardization effort...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2009

    Why Do Upgrades Fail And What Can We Do About It?

    Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading cause of upgrade failures. The authors propose a novel upgrade-centric fault model, based on data from three independent sources, which focuses on the impact of procedural errors rather...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2009

    Telecom Network and Service Management: An Operator Survey

    It is hard to know which research problems in network management, the authors should focus their attention on. To remedy this situation, they have surveyed fifteen different telecom operators on four continents to gather some feedback on what they desire and expect from the network management research community. Their input...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2009

    Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are playing a vital role in an ever-growing number of applications ranging from environmental surveillance over medical monitoring to home automation. Since WSNs are often deployed in unattended or even hostile environments, they can be subject to various malicious attacks, including the manipulation and capture of...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2010

    Enterprise Modeling for Business Intelligence

    Business Intelligence (BI) software aims to enable business users to easily access and analyze relevant enterprise information so that they can make timely and fact-based decisions. However, despite user friendly features such as dashboards and other visualizations, business users still find BI software hard to use and inflexible for their...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2009

    WReX: A Scalable Middleware Architecture to Enable XML Caching for Web-Services

    Web service caching, i.e., caching the responses of XML web service requests, is needed for designing scalable web service architectures. Such caching of dynamic content requires maintaining the caches appropriately to reflect dynamic updates to the back-end data source. In the database, especially relational, context, extensive research has addressed the...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2009

    TIUPAM: A Framework for Trustworthiness-Centric Information Sharing

    Information is essential to decision making. Nowadays, decision makers are often overwhelmed with large volumes of information, some of which may be inaccurate, incorrect, inappropriate, misleading, or maliciously introduced. With the advocated shift of information sharing paradigm from "Need to know" to "need to share" this problem will be further...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2009

    Why Do Upgrades Fail And What Can We Do About It?

    Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading cause of upgrade failures. The authors propose a novel upgrade-centric fault model, based on data from three independent sources, which focuses on the impact of procedural errors rather...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2010

    Distributed and Secure Access Control in P2P Databases

    The intent of Peer Data Management Systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to restrict the access to authorized parties. In this paper, the authors study a distributed access control model, where data items are stored,...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2009

    CHAP: Enabling Efficient Hardware-Based Multiple Hash Schemes for IP Lookup

    Building a high performance IP lookup engine remains a challenge due to increasingly stringent throughput requirements and the growing size of IP tables. An emerging approach for IP lookup is the use of set associative memory architecture, which is basically a hardware implementation of an open addressing hash table with...

    Provided By International Federation for Information Processing

  • White Papers // May 2009

    Video Broadcasting to Heterogeneous Mobile Devices

    The authors study the problem of broadcasting multiple scalable video streams to heterogeneous mobile devices, which have limited energy budgets. They show that scalable video streams should be broadcast in a different manner than nonscalable streams; otherwise energy of mobile devices could be wasted. They propose an efficient broadcast scheme...

    Provided By International Federation for Information Processing

  • White Papers // Sep 2009

    Exploring the Design Space for Network Protocol Stacks on Special - Purpose Embedded Systems

    Many special-purpose embedded systems such as automobiles and aircrafts consist of multiple embedded controllers connected through embedded network interconnect. Such network interconnects have particular characteristics and thus have different communication requirements. Accordingly, the authors need to frequently implement new protocol stacks for embedded systems. Implementing new protocol stacks on embedded...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2010

    Kevlar: A Flexible Infrastructure for Wide-Area Collaborative Applications

    While web services ensure interoperability and extensibility for networked applications, they also complicate the deployment of highly collaborative systems, such as virtual reality environments and massively multiplayer online games. Quite simply, such systems often manifest a natural peer-to-peer structure. This conflicts with web services' imposition of a client-server communication model,...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    A Deep Dive Into the LISP Cache and What ISPs Should Know About It

    Due to scalability issues that the current Internet is facing, the research community has re-discovered the locator/ID split paradigm. As the name suggests, this paradigm is based on the idea of separating the identity from the location of end-systems, in order to increase the scalability of the Internet architecture. One...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2010

    Multi-Agent Topologies Over WSANs in the Context of Fault Tolerant Supervision

    Wireless Sensor and Actuator Networks (WSANs) has attracted considerable attention in the last few years. They are distributed networks of sensors and actuators nodes, which act together in order to monitor and/or control a diversity of physical environments. Each node is a small electronic device with wireless communication capabilities, including...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2009

    Congestion Control in Wireless Sensor Networks Based on the Bird Flocking Behavior

    Recently, performance controlled wireless sensor networks have attracted significant interest with the emergence of mission-critical applications (e.g. health monitoring). Performance control can be carried out by robust congestion control approaches that aim to keep the network operational under varying network conditions. In this paper, swarm intelligence is successfully employed to...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2009

    Efficient Assignment of Multiple e-MBMS Sessions Towards LTE

    One of the major prerequisites for Long Term Evolution (LTE) networks is the mass provision of multimedia services to mobile users. To this end, Evolved - Multimedia Broadcast/Multicast Service (E-MBMS) is envisaged to play an instrumental role during LTE standardization process and ensure LTE's proliferation in mobile market. E-MBMS targets...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Multicast in Multi-Channel Wireless Mesh Networks

    The authors study high-throughput multicast solutions for Wireless Mesh Networks (WMN). Two techniques in WMN design are considered for combating wireless bandwidth limitations and wireless interference, respectively: introducing multiple mesh gateways and exploiting the diversity of wireless channels. They target a cross-layer solution that jointly selects appropriate channels for each...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2011

    Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System

    Traditional Identification-centric RFID System (IRS) is designed to provide services of object identification/tracing/locating, but it has some shortcomings when encountering a dynamic environment in which the status of the systems and the service requirements of users/objects may change continuously. Very recently a new Code-centric RFID System (CRS), which is far...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2010

    Interactive Goal Model Analysis Applied - Systematic Procedures Versus Ad Hoc Analysis

    Intentional modeling, capturing the goals of stakeholders, has been proposed as a means of early system elicitation and design for an enterprise, focusing on social and strategic requirements. It is often assumed that more utility can be gained from goal models by applying explicit analysis over models, but little work...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2009

    Calibrating Wireless Sensor Network Simulation Models With Real-World Experiments

    This paper studies the energy-efficiency and service characteristics of a recently developed energy-efficient MAC protocol for wireless sensor networks in simulation and on a real sensor hardware testbed. This opportunity is seized to illustrate how simulation models can be verified by cross-comparing simulation results with real-world experiment results. The paper...

    Provided By International Federation for Information Processing

  • White Papers // May 2009

    Humpty Dumpty: Putting IBGP Back Together Again

    Humpty Dumpty is the anthropomorphic nursery-rhyme egg broken into many pieces. Similarly, the authors have many pieces of measurement data to represent the current iBGP state. However, unlike the nursery-rhyme where the King's men couldn't put Humpty together again, they present a systematic approach to putting all the pieces of...

    Provided By International Federation for Information Processing

  • White Papers // May 2009

    A DSL for Explaining Probabilistic Reasoning

    The authors propose a new focus in language design where languages provide constructs that not only describe the computation of results, but also produce explanations of how and why those results were obtained. They posit that if users are to understand computations produced by a language, that language should provide...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2011

    Contrail: Enabling Decentralized Social Networks on Smartphones

    Mobile devices are increasingly used for social networking applications, where data is shared between devices belonging to different users. Today, such applications are implemented as centralized services, forcing users to trust corporations with their personal data. While decentralized designs for such applications can provide privacy, they are difficult to achieve...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2009

    SIPHoc: Efficient SIP Middleware for Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) offer a flexible way to connect mobile devices to build complex infrastructures. A key issue in MANETs is session set up and management since, unlike in conventional networks, there is no centralized component to provide such a service. Yet, session set up is necessary to...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2009

    Identify P2P Traffic by Inspecting Data Transfer Behaviour

    Classifying network traffic according to its applications is important to a broad range of network areas. Since new applications, especially P2P applications, no longer use well-known fixed port numbers, the native port based traffic classification technique has become much less effective. In this paper, the authors propose a novel approach...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2009

    Telecom Network and Service Management: An Operator Survey

    It is hard to know which research problems in network management, the authors should focus their attention on. To remedy this situation, they have surveyed fifteen different telecom operators on four continents to gather some feedback on what they desire and expect from the network management research community. Their input...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    Autonomic Management for Personalized Handover Decisions in Heterogeneous Wireless Networks

    The computation of good and optimal handover decisions is a significant problem in a heterogeneous network environment. This is exacerbated when the goal is to provide personalized services for mobile users as opposed to generic device metrics such as received signal strength. Personalized handover decisions should not only consider received...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2011

    Stabilized Edge-to-Edge Aggregate Flow Control

    In this paper, the authors present a distributed flow control scheme which achieves weighted max-min fair bandwidth allocation among all source-destination pairs on a per-aggregate basis within its network. The motivation behind the scheme is the absence of per-aggregate flow control in the current Internet, resulting in inability to enforce...

    Provided By International Federation for Information Processing

  • White Papers // Jun 2011

    Multiparty Authorization Framework for Data Sharing in Online Social Networks

    Online Social Networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractive means for digital social interactions and information sharing, but also raise a number of security and privacy issues. While OSNs allow users...

    Provided By International Federation for Information Processing

  • White Papers // May 2012

    Remedy: Network-Aware Steady State VM Management for Data Centers

    Steady state VM-management in data centers should be network-aware so that VM migrations do not degrade network performance of other flows in the network, and if required, a VM migration can be intelligently orchestrated to decongest a network hotspot. Recent research in network-aware management of VMs has focused mainly on...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    VMFlow: Leveraging VM Mobility to Reduce Network Power Costs in Data Centers

    Networking costs play an important role in the overall costs of a modern data center. Network power, for example, has been estimated at 10-20% of the overall data center power consumption. Traditional power saving techniques in data centers focus on server power reduction through Virtual Machine (VM) migration and server...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2012

    Trust Model for Optimized Cloud Services

    Cloud computing with its inherent advantages draws attention for business critical applications, but concurrently expects high level of trust in cloud service providers. Reputation-based trust is emerging as a good choice to model trust of cloud service providers based on available evidence. Many existing reputation based systems either ignore or...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2012

    Implementation and Evaluation of Coupled Congestion Control for Multipath TCP

    Multipath TCP (MPTCP) is an experimental protocol currently under standardization in the IETF. MPTCP allows to use multiple TCP connections for one data transmission if at least one of the endpoints is multi-homed. For example, this can be a mobile device with a Wi-Fi and a 3G interface. It is...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2012

    Migrating a Legacy Web-Based Document-Analysis Application to Hadoop and HBase: An Experience Report

    Migrating a legacy application to a more modern computing platform is a recurring software-development activity. This paper describes the authors' experience with a contemporary rendition of this activity, migrating a web-based system to a service-oriented application on two different cloud software platforms, Hadoop and HBase. Using the case study as...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2012

    An Architecture for Overlaying Private Clouds on Public Providers

    Organizations shifting to a public cloud infrastructure face potential hurdles regarding control and security, and must acquire a new set of best practices regarding developing and deploying to a cloud infrastructure. The authors propose a reference architecture for a virtual private cloud built on cross-provider on-demand compute instances, with a...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2009

    Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System

    Network Coordinate (NC) system allows efficient Internet distance prediction with scalable measurements. Most of the NC systems are based on embedding hosts into a low dimensional Euclidean space. Unfortunately, the accuracy of predicted distances is largely hurt by the persistent occurrence of Triangle Inequality Violation (TIV) in measured Internet distances....

    Provided By International Federation for Information Processing

  • White Papers // May 2011

    On the Uplink Performance of TCP in Multi-Rate 802.11 WLANs

    IEEE 802.11 defines several physical layer data rates to provide more robust communication by falling back to a lower rate in the presence of high noise levels. The choice of the current rate can be automatized; e.g., Auto-Rate Fallback (ARF) is a well-known mechanism in which the sender adapts its...

    Provided By International Federation for Information Processing

  • White Papers // May 2013

    Throughput Regions and Optimal Policies in Wireless Networks With Opportunistic Routing

    Opportunistic routing in wireless networks has been proposed as a method to combat the volatility of wireless links, by leveraging their broadcast nature and choosing the next hop for each transmitted packet post-facto, using the actual reception outcomes at the respective neighbors, rather than based on a priori information. Much...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2012

    Secure Client Puzzles Based on Random Beacons

    Denial of Service (DoS) attacks pose a fast-growing threat to network services in the Internet, but also corporate Intranets and public local area networks like Wi-Fi hotspots may be affected. Especially protocols that perform authentication and key exchange relying on expensive public key cryptography are likely to be preferred targets....

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Survivable Virtual Network Embedding

    Network virtualization can offer more flexibility and better manageability for the future Internet by allowing multiple heterogeneous Virtual Networks (VN) to coexist on a shared Infrastructure Provider (InP) network. A major challenge in this respect is the VN embedding problem that deals with the efficient mapping of virtual resources on...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Dynamic Service Placement in Shared Service Hosting Infrastructures

    Large-scale shared service hosting environments, such as content delivery networks and cloud computing, have gained much popularity in recent years. A key challenge faced by service owners in these environments is to determine the locations where service instances (e.g. virtual machine instances) should be placed such that the hosting cost...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2011

    A Middleware Layer for Flexible and Cost-Efficient Multi-Tenant Applications

    Application-level multi-tenancy is an architectural design principle for Software-as-a-Service applications to enable the hosting of multiple customers (or tenants) by a single application instance. Despite the operational cost and maintenance benefits of application-level multi-tenancy, the current middleware component models for multi-tenant application design are inflexible with respect to providing different...

    Provided By International Federation for Information Processing