International Federation for Information Processing

Displaying 1-40 of 70 results

  • White Papers // Jul 2014

    Model Analysis of Data Integration of Enterprises and E-Commerce Based on ODS

    Electronic commerce systems are the ones that are built on the internet and other networks to realize enterprise's business objectives. Based on the discussion of ODS (Operational Data Store), enterprise data environment features and data integration requirement, three granularity level data models of web logs in e-commerce are analyzed. Further,...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2014

    A Strategic Framework for Enterprise Information Integration of ERP and E-Commerce

    At the end of last century, e-commerce and ERP become the main methods to improve competitive power, but the integration of enterprise information of ERP and e-commerce system puzzled many enterprises, so in this paper, the integration importance and the main problems that are faced in the integration process are...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2014

    The Role of Post-Adoption Phase Trust in B2C E-Service Loyalty: Towards a More Comprehensive Picture

    Despite the extensive interest in trust within Information Systems (IS) and e-commerce disciplines, only few studies examine trust in the post-adoption phase of the customer relationship. Not only gaining new customers by increasing adoption, but also keeping the existing ones loyal, is largely considered important for e-business success. This paper...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2014

    Knowledge Innovation in E-Business Enterprises

    E-business is not a new topic, and many authors made many researches on this topic, such as the relationship between e-business and competitiveness, the advantages of e-business, e-business and knowledge management, e-business and management innovation, and so on. However, knowledge innovation in e-business enterprises is an ignored field. In fact,...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2014

    Analysis of the Supply-Demand Value Chain in the B2B E-Business

    Value chain is a basic method and framework to understand enterprise behavior and guide competition conduct. In the B2B (Business-To-Business) e-business, traditional value chain changes greatly under the influence of information technology. So, in the paper, B2B e-business's influence on traditional value chain was analyzed, and similarities and differences between...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2014

    The Relationship Between Supply Chain Management and ERP in E-Business

    Supply Chain Management (SCM) in today's global environment, especially the e-business is important to create significant competition advantages to firms and business partners worldwide. Since the objectives and goals are essential factors in the study of supply chain management in the e-business. This paper is to present the research question,...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2014

    An Intergrated Data Mining and Survival Analysis Model for Customer Segmentation

    More and more literatures have researched the application of data mining technology in customer segmentation, and achieved sound effects. One of the key purposes of customer segmentation is customer retention. But the application of single data mining technology mentioned in previous literatures is unable to identify customer churn trend for...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2014

    Study of Determinants of E-CRM in Influencing Consumer Satisfaction in B2C Websites

    The book CRM (Customer Relationship Management) theory design practice and customer relationship management introduce the concept and function of e-CRM which contributes to this paper. This paper empirically develop a model indicating the determinants of e-CRM as well as explaining the relationship between e-CRM and customer satisfaction in B2C (Business-To-Customer)...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2014

    An Evaluation System Model for Analyzing Employee Turnover Risk

    Evaluation system model is a key point of employee turnover risk evaluation in enterprises. It is important to the validity and veracity of evaluation result. This paper focused on the analysis and design of processes, and techniques of employee turnover risk evaluation system model. A multilevel employee turnover risk evaluation...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2014

    Analysis of E-Commerce Model in Transaction Cost Economics Framework

    In this paper, the author introduces the theory and method of transaction cost economics to identify the essence of e-commerce model by explicating its core objective and function. From the correspondence of transactions and governance structures, the author also discusses the design principle of an ecommerce model. The analysis shows...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2014

    Experience-Based Trust in E-Commerce

    Trust is significant for e-commerce and has received increasing attention in e-commerce, multi-agent systems, and Artificial Intelligence (AI). However, little attention has been given to the theoretical foundation and intelligent techniques for trust in e-commerce from either a logical or intelligent systems viewpoint. This paper will fill this gap by...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2014

    Web-Based Coordination for E-Commerce

    As the e-commerce environment becomes more pervasive and dynamic, coordination among companies are required more frequently than ever. The authors give the definition of coordination as well as the model of ecommerce based on web; the communication in e-commerce is described; the function of coordination, include the architecture, execution and...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2014

    Research on Evaluation Architecture of Marketing Performance for E-Commerce Websites

    With the development of e-commerce websites, more and more firms use websites to advertise their products and brands and statues. How to evaluate marketing performance of firms on web-based e-commerce becomes more important problem. This paper analyses influencing factors of marketing performance under e-commerce websites. And it suggests an evaluation...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2014

    Information Overload on E-Commerce

    In online purchases process, the consumer can experience the information overload state. This paper deals about the affective answers of the customers of e-commerce to this phenomenon, which represents the behavior of the consumer on influence of an exceeding number of information its capacity of individual processing. The adopted methodology...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2014

    Two Fair Payment Protocols for E-Commerce Transaction

    Fairness is an important property of secure electronic commerce. Most of e-payment protocols guarantee fairness by using a Trusted Third Party (TTP) or semi-trusted third party. There are few protocols without a trusted third party. Based on concurrent signature, the authors propose two protocols suitable for digital products transaction, one...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2013

    Leveraging Attention Scarcity to Improve the Overall User Experience of Cloud Services

    Applications for mobile devices are increasingly relying on cloud services to provide content and offload data processing tasks. Traditionally, web-based systems have been optimized to improve response time. Touch sensitive screens and the various sensors of mobile devices allow for better instrumentation, enabling providers to obtain more honest signals on...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2013

    SAVI Testbed: Control and Management of Converged Virtual ICT Resources

    In this paper the authors introduce the SAVI testbed for control and management of converged virtual ICT resources. The SAVI testbed attempts to create an open applications marketplace that operates on converged virtual computing and networking infrastructures and supports experimentation with emerging Future Internet protocols and applications. In this paper...

    Provided By International Federation for Information Processing

  • White Papers // May 2013

    Throughput Regions and Optimal Policies in Wireless Networks With Opportunistic Routing

    Opportunistic routing in wireless networks has been proposed as a method to combat the volatility of wireless links, by leveraging their broadcast nature and choosing the next hop for each transmitted packet post-facto, using the actual reception outcomes at the respective neighbors, rather than based on a priori information. Much...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2012

    SOFTScale: Stealing Opportunistically for Transient Scaling

    Dynamic capacity provisioning is a well studied approach to handling gradual changes in data center load. However, abrupt spikes in load are still problematic in that the work in the system rises very quickly during the setup time needed to turn on additional capacity. Performance can be severely affected even...

    Provided By International Federation for Information Processing

  • White Papers // Sep 2012

    Mappings From BPEL to PMR for Business Process Registration

    In order to facilitate business collaboration and interoperation in virtual enterprises, it is crucial to discover appropriate business processes modeled in different languages and stored in different repositories. For this purpose, it is more efficient to register existent process models into a common process model registry, rather than defining numerous...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2012

    An Architecture for Overlaying Private Clouds on Public Providers

    Organizations shifting to a public cloud infrastructure face potential hurdles regarding control and security, and must acquire a new set of best practices regarding developing and deploying to a cloud infrastructure. The authors propose a reference architecture for a virtual private cloud built on cross-provider on-demand compute instances, with a...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2012

    A Taxonomy of Dirty Time-Oriented Data

    Data quality is a vital topic for business analytics in order to gain accurate insight and make correct decisions in many data-intensive industries. Albeit systematic approaches to categorize, detect, and avoid data quality problems exist, the special characteristics of time-oriented data are hardly considered. However, time is an important data...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2012

    Implementation and Evaluation of Coupled Congestion Control for Multipath TCP

    Multipath TCP (MPTCP) is an experimental protocol currently under standardization in the IETF. MPTCP allows to use multiple TCP connections for one data transmission if at least one of the endpoints is multi-homed. For example, this can be a mobile device with a Wi-Fi and a 3G interface. It is...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2012

    Statelets: Coordination of Social Collaboration Processes

    Today people work together across time, space, cultural and organizational boundaries. To simplify and automate the work, collaboration employs a broad range of tools, such as project management software, groupware, social networking services, or wikis. For a collaboration to be effective, the actions of collaborators need to be properly coordinated,...

    Provided By International Federation for Information Processing

  • White Papers // Jun 2012

    ROAC: A Role-Oriented Access Control Model

    Role-Based Access Control (RBAC) has become the de facto standard for realizing authorization requirements in a wide range of organizations. Existing RBAC models suffer from two main shortcomings; lack of expressiveness of roles/permissions and ambiguities of their hierarchies. Roles/permissions expressiveness is limited since roles do not have the ability to...

    Provided By International Federation for Information Processing

  • White Papers // May 2012

    Remedy: Network-Aware Steady State VM Management for Data Centers

    Steady state VM-management in data centers should be network-aware so that VM migrations do not degrade network performance of other flows in the network, and if required, a VM migration can be intelligently orchestrated to decongest a network hotspot. Recent research in network-aware management of VMs has focused mainly on...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2012

    Migrating a Legacy Web-Based Document-Analysis Application to Hadoop and HBase: An Experience Report

    Migrating a legacy application to a more modern computing platform is a recurring software-development activity. This paper describes the authors' experience with a contemporary rendition of this activity, migrating a web-based system to a service-oriented application on two different cloud software platforms, Hadoop and HBase. Using the case study as...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2012

    HyperForce: Hypervisor-enForced Execution of Security-Critical Code

    The sustained popularity of the cloud and cloud-related services accelerate the evolution of virtualization-enabling technologies. Modern off-the-shelf computers are already equipped with specialized hardware that enables a hypervisor to manage the simultaneous execution of multiple operating systems. Researchers have proposed security mechanisms that operate within such a hypervisor to protect...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2012

    Secure Client Puzzles Based on Random Beacons

    Denial of Service (DoS) attacks pose a fast-growing threat to network services in the Internet, but also corporate Intranets and public local area networks like Wi-Fi hotspots may be affected. Especially protocols that perform authentication and key exchange relying on expensive public key cryptography are likely to be preferred targets....

    Provided By International Federation for Information Processing

  • White Papers // Mar 2012

    Trust Model for Optimized Cloud Services

    Cloud computing with its inherent advantages draws attention for business critical applications, but concurrently expects high level of trust in cloud service providers. Reputation-based trust is emerging as a good choice to model trust of cloud service providers based on available evidence. Many existing reputation based systems either ignore or...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2011

    A Middleware Layer for Flexible and Cost-Efficient Multi-Tenant Applications

    Application-level multi-tenancy is an architectural design principle for Software-as-a-Service applications to enable the hosting of multiple customers (or tenants) by a single application instance. Despite the operational cost and maintenance benefits of application-level multi-tenancy, the current middleware component models for multi-tenant application design are inflexible with respect to providing different...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2011

    Contrail: Enabling Decentralized Social Networks on Smartphones

    Mobile devices are increasingly used for social networking applications, where data is shared between devices belonging to different users. Today, such applications are implemented as centralized services, forcing users to trust corporations with their personal data. While decentralized designs for such applications can provide privacy, they are difficult to achieve...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2011

    Observations on e-Business Implementation Capabilities in Heterogeneous Business Networks

    This paper was to understand the factors that hinder large industry organizations in implementing e-Business solutions. The study included 4 organizations that operated in heterogeneous business networks consisting also of small partners. Interviews were conducted with managers of IT, purchasing and business development. The results indicate that the organizations faced...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2011

    An Efficient Architectural Design of Hardware Interface for Heterogeneous Multi-Core System

    How to manage the message passing among inter processor cores with lower overhead is a great challenge when the multi-core system is the contemporary solution to satisfy high performance and low energy demands in general and embedded computing domains. Generally speaking, the Network-on-Chip (NoCs) connects the distributed multi-core system. It...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2011

    Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System

    Traditional Identification-centric RFID System (IRS) is designed to provide services of object identification/tracing/locating, but it has some shortcomings when encountering a dynamic environment in which the status of the systems and the service requirements of users/objects may change continuously. Very recently a new Code-centric RFID System (CRS), which is far...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2011

    Stabilized Edge-to-Edge Aggregate Flow Control

    In this paper, the authors present a distributed flow control scheme which achieves weighted max-min fair bandwidth allocation among all source-destination pairs on a per-aggregate basis within its network. The motivation behind the scheme is the absence of per-aggregate flow control in the current Internet, resulting in inability to enforce...

    Provided By International Federation for Information Processing

  • White Papers // Jun 2011

    Multiparty Authorization Framework for Data Sharing in Online Social Networks

    Online Social Networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractive means for digital social interactions and information sharing, but also raise a number of security and privacy issues. While OSNs allow users...

    Provided By International Federation for Information Processing

  • White Papers // May 2011

    On the Uplink Performance of TCP in Multi-Rate 802.11 WLANs

    IEEE 802.11 defines several physical layer data rates to provide more robust communication by falling back to a lower rate in the presence of high noise levels. The choice of the current rate can be automatized; e.g., Auto-Rate Fallback (ARF) is a well-known mechanism in which the sender adapts its...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    VMFlow: Leveraging VM Mobility to Reduce Network Power Costs in Data Centers

    Networking costs play an important role in the overall costs of a modern data center. Network power, for example, has been estimated at 10-20% of the overall data center power consumption. Traditional power saving techniques in data centers focus on server power reduction through Virtual Machine (VM) migration and server...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    A Deep Dive Into the LISP Cache and What ISPs Should Know About It

    Due to scalability issues that the current Internet is facing, the research community has re-discovered the locator/ID split paradigm. As the name suggests, this paradigm is based on the idea of separating the identity from the location of end-systems, in order to increase the scalability of the Internet architecture. One...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2010

    Enterprise Modeling for Business Intelligence

    Business Intelligence (BI) software aims to enable business users to easily access and analyze relevant enterprise information so that they can make timely and fact-based decisions. However, despite user friendly features such as dashboards and other visualizations, business users still find BI software hard to use and inflexible for their...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2010

    Distributed and Secure Access Control in P2P Databases

    The intent of Peer Data Management Systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to restrict the access to authorized parties. In this paper, the authors study a distributed access control model, where data items are stored,...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2009

    Why Do Upgrades Fail And What Can We Do About It?

    Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading cause of upgrade failures. The authors propose a novel upgrade-centric fault model, based on data from three independent sources, which focuses on the impact of procedural errors rather...

    Provided By International Federation for Information Processing

  • White Papers // Sep 2009

    Exploring the Design Space for Network Protocol Stacks on Special - Purpose Embedded Systems

    Many special-purpose embedded systems such as automobiles and aircrafts consist of multiple embedded controllers connected through embedded network interconnect. Such network interconnects have particular characteristics and thus have different communication requirements. Accordingly, the authors need to frequently implement new protocol stacks for embedded systems. Implementing new protocol stacks on embedded...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2010

    Kevlar: A Flexible Infrastructure for Wide-Area Collaborative Applications

    While web services ensure interoperability and extensibility for networked applications, they also complicate the deployment of highly collaborative systems, such as virtual reality environments and massively multiplayer online games. Quite simply, such systems often manifest a natural peer-to-peer structure. This conflicts with web services' imposition of a client-server communication model,...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    A Deep Dive Into the LISP Cache and What ISPs Should Know About It

    Due to scalability issues that the current Internet is facing, the research community has re-discovered the locator/ID split paradigm. As the name suggests, this paradigm is based on the idea of separating the identity from the location of end-systems, in order to increase the scalability of the Internet architecture. One...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2010

    Multi-Agent Topologies Over WSANs in the Context of Fault Tolerant Supervision

    Wireless Sensor and Actuator Networks (WSANs) has attracted considerable attention in the last few years. They are distributed networks of sensors and actuators nodes, which act together in order to monitor and/or control a diversity of physical environments. Each node is a small electronic device with wireless communication capabilities, including...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2009

    Congestion Control in Wireless Sensor Networks Based on the Bird Flocking Behavior

    Recently, performance controlled wireless sensor networks have attracted significant interest with the emergence of mission-critical applications (e.g. health monitoring). Performance control can be carried out by robust congestion control approaches that aim to keep the network operational under varying network conditions. In this paper, swarm intelligence is successfully employed to...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    Autonomic Management for Personalized Handover Decisions in Heterogeneous Wireless Networks

    The computation of good and optimal handover decisions is a significant problem in a heterogeneous network environment. This is exacerbated when the goal is to provide personalized services for mobile users as opposed to generic device metrics such as received signal strength. Personalized handover decisions should not only consider received...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Multicast in Multi-Channel Wireless Mesh Networks

    The authors study high-throughput multicast solutions for Wireless Mesh Networks (WMN). Two techniques in WMN design are considered for combating wireless bandwidth limitations and wireless interference, respectively: introducing multiple mesh gateways and exploiting the diversity of wireless channels. They target a cross-layer solution that jointly selects appropriate channels for each...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2009

    Telecom Network and Service Management: An Operator Survey

    It is hard to know which research problems in network management, the authors should focus their attention on. To remedy this situation, they have surveyed fifteen different telecom operators on four continents to gather some feedback on what they desire and expect from the network management research community. Their input...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2011

    Observations on e-Business Implementation Capabilities in Heterogeneous Business Networks

    This paper was to understand the factors that hinder large industry organizations in implementing e-Business solutions. The study included 4 organizations that operated in heterogeneous business networks consisting also of small partners. Interviews were conducted with managers of IT, purchasing and business development. The results indicate that the organizations faced...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2009

    Supporting Cross-Organizational Process Control

    E-contracts express the rights and obligations of parties through a formal, digital representation of the contract provisions. In process intensive relationships, e-contracts contain business processes that a party promises to perform for the counter party, optionally allowing monitoring of the execution of the promised processes. In this paper, the authors...

    Provided By International Federation for Information Processing

  • White Papers // Sep 2012

    Mappings From BPEL to PMR for Business Process Registration

    In order to facilitate business collaboration and interoperation in virtual enterprises, it is crucial to discover appropriate business processes modeled in different languages and stored in different repositories. For this purpose, it is more efficient to register existent process models into a common process model registry, rather than defining numerous...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2012

    Statelets: Coordination of Social Collaboration Processes

    Today people work together across time, space, cultural and organizational boundaries. To simplify and automate the work, collaboration employs a broad range of tools, such as project management software, groupware, social networking services, or wikis. For a collaboration to be effective, the actions of collaborators need to be properly coordinated,...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2006

    Attack Graph Based Evaluation of Network Security

    The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs (trees, nets), the subsequent checking of various properties of these graphs, and determining security metrics which can explain possible ways to increase security level. The paper suggests a new...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Towards Vulnerability Prevention in Autonomic Networks and Systems

    The autonomic paradigm has been introduced in order to cope with the growing complexity of management. In that context, autonomic networks and systems are in charge of their own configuration. However, the changes that are operated by these environments may generate vulnerable configurations. In the meantime, a strong standardization effort...

    Provided By International Federation for Information Processing

  • White Papers // May 2011

    On the Uplink Performance of TCP in Multi-Rate 802.11 WLANs

    IEEE 802.11 defines several physical layer data rates to provide more robust communication by falling back to a lower rate in the presence of high noise levels. The choice of the current rate can be automatized; e.g., Auto-Rate Fallback (ARF) is a well-known mechanism in which the sender adapts its...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2011

    A Middleware Layer for Flexible and Cost-Efficient Multi-Tenant Applications

    Application-level multi-tenancy is an architectural design principle for Software-as-a-Service applications to enable the hosting of multiple customers (or tenants) by a single application instance. Despite the operational cost and maintenance benefits of application-level multi-tenancy, the current middleware component models for multi-tenant application design are inflexible with respect to providing different...

    Provided By International Federation for Information Processing

  • White Papers // May 2013

    Throughput Regions and Optimal Policies in Wireless Networks With Opportunistic Routing

    Opportunistic routing in wireless networks has been proposed as a method to combat the volatility of wireless links, by leveraging their broadcast nature and choosing the next hop for each transmitted packet post-facto, using the actual reception outcomes at the respective neighbors, rather than based on a priori information. Much...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2011

    Stabilized Edge-to-Edge Aggregate Flow Control

    In this paper, the authors present a distributed flow control scheme which achieves weighted max-min fair bandwidth allocation among all source-destination pairs on a per-aggregate basis within its network. The motivation behind the scheme is the absence of per-aggregate flow control in the current Internet, resulting in inability to enforce...

    Provided By International Federation for Information Processing

  • White Papers // Jun 2011

    Multiparty Authorization Framework for Data Sharing in Online Social Networks

    Online Social Networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractive means for digital social interactions and information sharing, but also raise a number of security and privacy issues. While OSNs allow users...

    Provided By International Federation for Information Processing

  • White Papers // May 2012

    Remedy: Network-Aware Steady State VM Management for Data Centers

    Steady state VM-management in data centers should be network-aware so that VM migrations do not degrade network performance of other flows in the network, and if required, a VM migration can be intelligently orchestrated to decongest a network hotspot. Recent research in network-aware management of VMs has focused mainly on...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    VMFlow: Leveraging VM Mobility to Reduce Network Power Costs in Data Centers

    Networking costs play an important role in the overall costs of a modern data center. Network power, for example, has been estimated at 10-20% of the overall data center power consumption. Traditional power saving techniques in data centers focus on server power reduction through Virtual Machine (VM) migration and server...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2012

    Trust Model for Optimized Cloud Services

    Cloud computing with its inherent advantages draws attention for business critical applications, but concurrently expects high level of trust in cloud service providers. Reputation-based trust is emerging as a good choice to model trust of cloud service providers based on available evidence. Many existing reputation based systems either ignore or...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2012

    Implementation and Evaluation of Coupled Congestion Control for Multipath TCP

    Multipath TCP (MPTCP) is an experimental protocol currently under standardization in the IETF. MPTCP allows to use multiple TCP connections for one data transmission if at least one of the endpoints is multi-homed. For example, this can be a mobile device with a Wi-Fi and a 3G interface. It is...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2012

    Migrating a Legacy Web-Based Document-Analysis Application to Hadoop and HBase: An Experience Report

    Migrating a legacy application to a more modern computing platform is a recurring software-development activity. This paper describes the authors' experience with a contemporary rendition of this activity, migrating a web-based system to a service-oriented application on two different cloud software platforms, Hadoop and HBase. Using the case study as...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2012

    An Architecture for Overlaying Private Clouds on Public Providers

    Organizations shifting to a public cloud infrastructure face potential hurdles regarding control and security, and must acquire a new set of best practices regarding developing and deploying to a cloud infrastructure. The authors propose a reference architecture for a virtual private cloud built on cross-provider on-demand compute instances, with a...

    Provided By International Federation for Information Processing

  • White Papers // Jun 2010

    Towards a P2P-Based Deployment of Network Management Information

    Standard static centralized network management approaches are unsuitable for managing large, dynamic and distributed networks. Some decentralized approaches based on the P2P model have emerged to overcome the limitations of these centralized approaches like lack of scalability and fault-tolerance. However, the authors do not address issues related to the deployment...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2011

    Contrail: Enabling Decentralized Social Networks on Smartphones

    Mobile devices are increasingly used for social networking applications, where data is shared between devices belonging to different users. Today, such applications are implemented as centralized services, forcing users to trust corporations with their personal data. While decentralized designs for such applications can provide privacy, they are difficult to achieve...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2010

    Interactive Goal Model Analysis Applied - Systematic Procedures Versus Ad Hoc Analysis

    Intentional modeling, capturing the goals of stakeholders, has been proposed as a means of early system elicitation and design for an enterprise, focusing on social and strategic requirements. It is often assumed that more utility can be gained from goal models by applying explicit analysis over models, but little work...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2011

    Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System

    Traditional Identification-centric RFID System (IRS) is designed to provide services of object identification/tracing/locating, but it has some shortcomings when encountering a dynamic environment in which the status of the systems and the service requirements of users/objects may change continuously. Very recently a new Code-centric RFID System (CRS), which is far...

    Provided By International Federation for Information Processing

  • White Papers // Jun 2006

    Co-optimization of Performance and Power in a Superscalar Processor Design

    As process technology scales down, power wall starts to hinder improvements in processor performance. Performance optimization has to proceed under a power constraint. The co-optimization requires exploration into a huge design space containing both performance and power factors, whose size is over costly for extensive traditional simulations. This paper describes...

    Provided By International Federation for Information Processing

  • White Papers // Jun 2008

    Using Imprecise Computation Techniques for Power Management in Real-Time Embedded Systems

    Embedded systems present severe limitations in terms of processing and memory capabilities and are often powered by batteries, making energy an important resource to be managed. This work explores energy as a parameter for Quality of Service (QoS) of embedded systems. The goal is to guarantee the battery lifetime specified...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2008

    Process Mining Towards Semantics

    Process mining techniques target the automatic discovery of information about process models in organizations. The discovery is based on the execution data registered in event logs. Current techniques support a variety of practical analysis, but they are somewhat limited because the labels in the log are not linked to any...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Survivable Virtual Network Embedding

    Network virtualization can offer more flexibility and better manageability for the future Internet by allowing multiple heterogeneous Virtual Networks (VN) to coexist on a shared Infrastructure Provider (InP) network. A major challenge in this respect is the VN embedding problem that deals with the efficient mapping of virtual resources on...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Dynamic Service Placement in Shared Service Hosting Infrastructures

    Large-scale shared service hosting environments, such as content delivery networks and cloud computing, have gained much popularity in recent years. A key challenge faced by service owners in these environments is to determine the locations where service instances (e.g. virtual machine instances) should be placed such that the hosting cost...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2012

    Secure Client Puzzles Based on Random Beacons

    Denial of Service (DoS) attacks pose a fast-growing threat to network services in the Internet, but also corporate Intranets and public local area networks like Wi-Fi hotspots may be affected. Especially protocols that perform authentication and key exchange relying on expensive public key cryptography are likely to be preferred targets....

    Provided By International Federation for Information Processing

  • White Papers // Mar 2006

    A Smart Card-Based Mental Poker System

    Computer networks, and especially Internet, allow a lot of usual activities to be carried out in a time- and space-independent way. On-line casinos have experienced a great expansion since the generalized use of Internet started. There exist in the literature several proposals of systems allowing secure remote gaming. Nevertheless, the...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2013

    Leveraging Attention Scarcity to Improve the Overall User Experience of Cloud Services

    Applications for mobile devices are increasingly relying on cloud services to provide content and offload data processing tasks. Traditionally, web-based systems have been optimized to improve response time. Touch sensitive screens and the various sensors of mobile devices allow for better instrumentation, enabling providers to obtain more honest signals on...

    Provided By International Federation for Information Processing