International Federation for Information Processing

Displaying 1-40 of 69 results

  • White Papers // Oct 2013

    Leveraging Attention Scarcity to Improve the Overall User Experience of Cloud Services

    Applications for mobile devices are increasingly relying on cloud services to provide content and offload data processing tasks. Traditionally, web-based systems have been optimized to improve response time. Touch sensitive screens and the various sensors of mobile devices allow for better instrumentation, enabling providers to obtain more honest signals on...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2013

    SAVI Testbed: Control and Management of Converged Virtual ICT Resources

    In this paper the authors introduce the SAVI testbed for control and management of converged virtual ICT resources. The SAVI testbed attempts to create an open applications marketplace that operates on converged virtual computing and networking infrastructures and supports experimentation with emerging Future Internet protocols and applications. In this paper...

    Provided By International Federation for Information Processing

  • White Papers // May 2013

    Throughput Regions and Optimal Policies in Wireless Networks With Opportunistic Routing

    Opportunistic routing in wireless networks has been proposed as a method to combat the volatility of wireless links, by leveraging their broadcast nature and choosing the next hop for each transmitted packet post-facto, using the actual reception outcomes at the respective neighbors, rather than based on a priori information. Much...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2012

    SOFTScale: Stealing Opportunistically for Transient Scaling

    Dynamic capacity provisioning is a well studied approach to handling gradual changes in data center load. However, abrupt spikes in load are still problematic in that the work in the system rises very quickly during the setup time needed to turn on additional capacity. Performance can be severely affected even...

    Provided By International Federation for Information Processing

  • White Papers // Sep 2012

    Mappings From BPEL to PMR for Business Process Registration

    In order to facilitate business collaboration and interoperation in virtual enterprises, it is crucial to discover appropriate business processes modeled in different languages and stored in different repositories. For this purpose, it is more efficient to register existent process models into a common process model registry, rather than defining numerous...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2012

    An Architecture for Overlaying Private Clouds on Public Providers

    Organizations shifting to a public cloud infrastructure face potential hurdles regarding control and security, and must acquire a new set of best practices regarding developing and deploying to a cloud infrastructure. The authors propose a reference architecture for a virtual private cloud built on cross-provider on-demand compute instances, with a...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2012

    A Taxonomy of Dirty Time-Oriented Data

    Data quality is a vital topic for business analytics in order to gain accurate insight and make correct decisions in many data-intensive industries. Albeit systematic approaches to categorize, detect, and avoid data quality problems exist, the special characteristics of time-oriented data are hardly considered. However, time is an important data...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2012

    Implementation and Evaluation of Coupled Congestion Control for Multipath TCP

    Multipath TCP (MPTCP) is an experimental protocol currently under standardization in the IETF. MPTCP allows to use multiple TCP connections for one data transmission if at least one of the endpoints is multi-homed. For example, this can be a mobile device with a Wi-Fi and a 3G interface. It is...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2012

    Statelets: Coordination of Social Collaboration Processes

    Today people work together across time, space, cultural and organizational boundaries. To simplify and automate the work, collaboration employs a broad range of tools, such as project management software, groupware, social networking services, or wikis. For a collaboration to be effective, the actions of collaborators need to be properly coordinated,...

    Provided By International Federation for Information Processing

  • White Papers // Jun 2012

    ROAC: A Role-Oriented Access Control Model

    Role-Based Access Control (RBAC) has become the de facto standard for realizing authorization requirements in a wide range of organizations. Existing RBAC models suffer from two main shortcomings; lack of expressiveness of roles/permissions and ambiguities of their hierarchies. Roles/permissions expressiveness is limited since roles do not have the ability to...

    Provided By International Federation for Information Processing

  • White Papers // May 2012

    Remedy: Network-Aware Steady State VM Management for Data Centers

    Steady state VM-management in data centers should be network-aware so that VM migrations do not degrade network performance of other flows in the network, and if required, a VM migration can be intelligently orchestrated to decongest a network hotspot. Recent research in network-aware management of VMs has focused mainly on...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2012

    Migrating a Legacy Web-Based Document-Analysis Application to Hadoop and HBase: An Experience Report

    Migrating a legacy application to a more modern computing platform is a recurring software-development activity. This paper describes the authors' experience with a contemporary rendition of this activity, migrating a web-based system to a service-oriented application on two different cloud software platforms, Hadoop and HBase. Using the case study as...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2012

    HyperForce: Hypervisor-enForced Execution of Security-Critical Code

    The sustained popularity of the cloud and cloud-related services accelerate the evolution of virtualization-enabling technologies. Modern off-the-shelf computers are already equipped with specialized hardware that enables a hypervisor to manage the simultaneous execution of multiple operating systems. Researchers have proposed security mechanisms that operate within such a hypervisor to protect...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2012

    Secure Client Puzzles Based on Random Beacons

    Denial of Service (DoS) attacks pose a fast-growing threat to network services in the Internet, but also corporate Intranets and public local area networks like Wi-Fi hotspots may be affected. Especially protocols that perform authentication and key exchange relying on expensive public key cryptography are likely to be preferred targets....

    Provided By International Federation for Information Processing

  • White Papers // Mar 2012

    Trust Model for Optimized Cloud Services

    Cloud computing with its inherent advantages draws attention for business critical applications, but concurrently expects high level of trust in cloud service providers. Reputation-based trust is emerging as a good choice to model trust of cloud service providers based on available evidence. Many existing reputation based systems either ignore or...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2011

    A Middleware Layer for Flexible and Cost-Efficient Multi-Tenant Applications

    Application-level multi-tenancy is an architectural design principle for Software-as-a-Service applications to enable the hosting of multiple customers (or tenants) by a single application instance. Despite the operational cost and maintenance benefits of application-level multi-tenancy, the current middleware component models for multi-tenant application design are inflexible with respect to providing different...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2011

    Contrail: Enabling Decentralized Social Networks on Smartphones

    Mobile devices are increasingly used for social networking applications, where data is shared between devices belonging to different users. Today, such applications are implemented as centralized services, forcing users to trust corporations with their personal data. While decentralized designs for such applications can provide privacy, they are difficult to achieve...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2011

    Observations on e-Business Implementation Capabilities in Heterogeneous Business Networks

    This paper was to understand the factors that hinder large industry organizations in implementing e-Business solutions. The study included 4 organizations that operated in heterogeneous business networks consisting also of small partners. Interviews were conducted with managers of IT, purchasing and business development. The results indicate that the organizations faced...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2011

    Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System

    Traditional Identification-centric RFID System (IRS) is designed to provide services of object identification/tracing/locating, but it has some shortcomings when encountering a dynamic environment in which the status of the systems and the service requirements of users/objects may change continuously. Very recently a new Code-centric RFID System (CRS), which is far...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2011

    Stabilized Edge-to-Edge Aggregate Flow Control

    In this paper, the authors present a distributed flow control scheme which achieves weighted max-min fair bandwidth allocation among all source-destination pairs on a per-aggregate basis within its network. The motivation behind the scheme is the absence of per-aggregate flow control in the current Internet, resulting in inability to enforce...

    Provided By International Federation for Information Processing

  • White Papers // Jun 2011

    Multiparty Authorization Framework for Data Sharing in Online Social Networks

    Online Social Networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractive means for digital social interactions and information sharing, but also raise a number of security and privacy issues. While OSNs allow users...

    Provided By International Federation for Information Processing

  • White Papers // May 2011

    On the Uplink Performance of TCP in Multi-Rate 802.11 WLANs

    IEEE 802.11 defines several physical layer data rates to provide more robust communication by falling back to a lower rate in the presence of high noise levels. The choice of the current rate can be automatized; e.g., Auto-Rate Fallback (ARF) is a well-known mechanism in which the sender adapts its...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    VMFlow: Leveraging VM Mobility to Reduce Network Power Costs in Data Centers

    Networking costs play an important role in the overall costs of a modern data center. Network power, for example, has been estimated at 10-20% of the overall data center power consumption. Traditional power saving techniques in data centers focus on server power reduction through Virtual Machine (VM) migration and server...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    A Deep Dive Into the LISP Cache and What ISPs Should Know About It

    Due to scalability issues that the current Internet is facing, the research community has re-discovered the locator/ID split paradigm. As the name suggests, this paradigm is based on the idea of separating the identity from the location of end-systems, in order to increase the scalability of the Internet architecture. One...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    Autonomic Management for Personalized Handover Decisions in Heterogeneous Wireless Networks

    The computation of good and optimal handover decisions is a significant problem in a heterogeneous network environment. This is exacerbated when the goal is to provide personalized services for mobile users as opposed to generic device metrics such as received signal strength. Personalized handover decisions should not only consider received...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    Improving the Scalability of Cloud-Based Resilient Database Servers

    Many rely now on public cloud infrastructure-as-a-service for database servers, mainly, by pushing the limits of existing pooling and replication software to operate large shared-nothing virtual server clusters. Yet, it is unclear whether this is still the best architectural choice, namely, when cloud infrastructure provides seamless virtual shared storage and...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2010

    Multi-Agent Topologies Over WSANs in the Context of Fault Tolerant Supervision

    Wireless Sensor and Actuator Networks (WSANs) has attracted considerable attention in the last few years. They are distributed networks of sensors and actuators nodes, which act together in order to monitor and/or control a diversity of physical environments. Each node is a small electronic device with wireless communication capabilities, including...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2010

    Enterprise Modeling for Business Intelligence

    Business Intelligence (BI) software aims to enable business users to easily access and analyze relevant enterprise information so that they can make timely and fact-based decisions. However, despite user friendly features such as dashboards and other visualizations, business users still find BI software hard to use and inflexible for their...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2010

    Interactive Goal Model Analysis Applied - Systematic Procedures Versus Ad Hoc Analysis

    Intentional modeling, capturing the goals of stakeholders, has been proposed as a means of early system elicitation and design for an enterprise, focusing on social and strategic requirements. It is often assumed that more utility can be gained from goal models by applying explicit analysis over models, but little work...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2010

    Kevlar: A Flexible Infrastructure for Wide-Area Collaborative Applications

    While web services ensure interoperability and extensibility for networked applications, they also complicate the deployment of highly collaborative systems, such as virtual reality environments and massively multiplayer online games. Quite simply, such systems often manifest a natural peer-to-peer structure. This conflicts with web services' imposition of a client-server communication model,...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2010

    Distributed and Secure Access Control in P2P Databases

    The intent of Peer Data Management Systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to restrict the access to authorized parties. In this paper, the authors study a distributed access control model, where data items are stored,...

    Provided By International Federation for Information Processing

  • White Papers // Jun 2010

    Towards a P2P-Based Deployment of Network Management Information

    Standard static centralized network management approaches are unsuitable for managing large, dynamic and distributed networks. Some decentralized approaches based on the P2P model have emerged to overcome the limitations of these centralized approaches like lack of scalability and fault-tolerance. However, the authors do not address issues related to the deployment...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Survivable Virtual Network Embedding

    Network virtualization can offer more flexibility and better manageability for the future Internet by allowing multiple heterogeneous Virtual Networks (VN) to coexist on a shared Infrastructure Provider (InP) network. A major challenge in this respect is the VN embedding problem that deals with the efficient mapping of virtual resources on...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Dynamic Service Placement in Shared Service Hosting Infrastructures

    Large-scale shared service hosting environments, such as content delivery networks and cloud computing, have gained much popularity in recent years. A key challenge faced by service owners in these environments is to determine the locations where service instances (e.g. virtual machine instances) should be placed such that the hosting cost...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Multicast in Multi-Channel Wireless Mesh Networks

    The authors study high-throughput multicast solutions for Wireless Mesh Networks (WMN). Two techniques in WMN design are considered for combating wireless bandwidth limitations and wireless interference, respectively: introducing multiple mesh gateways and exploiting the diversity of wireless channels. They target a cross-layer solution that jointly selects appropriate channels for each...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Towards Vulnerability Prevention in Autonomic Networks and Systems

    The autonomic paradigm has been introduced in order to cope with the growing complexity of management. In that context, autonomic networks and systems are in charge of their own configuration. However, the changes that are operated by these environments may generate vulnerable configurations. In the meantime, a strong standardization effort...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2009

    Why Do Upgrades Fail And What Can We Do About It?

    Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading cause of upgrade failures. The authors propose a novel upgrade-centric fault model, based on data from three independent sources, which focuses on the impact of procedural errors rather...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2009

    Telecom Network and Service Management: An Operator Survey

    It is hard to know which research problems in network management, the authors should focus their attention on. To remedy this situation, they have surveyed fifteen different telecom operators on four continents to gather some feedback on what they desire and expect from the network management research community. Their input...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2009

    Congestion Control in Wireless Sensor Networks Based on the Bird Flocking Behavior

    Recently, performance controlled wireless sensor networks have attracted significant interest with the emergence of mission-critical applications (e.g. health monitoring). Performance control can be carried out by robust congestion control approaches that aim to keep the network operational under varying network conditions. In this paper, swarm intelligence is successfully employed to...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2009

    Supporting Cross-Organizational Process Control

    E-contracts express the rights and obligations of parties through a formal, digital representation of the contract provisions. In process intensive relationships, e-contracts contain business processes that a party promises to perform for the counter party, optionally allowing monitoring of the execution of the promised processes. In this paper, the authors...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2009

    A Hybrid Hardware and Software Component Architecture for Embedded System Design

    Embedded systems are increasing in complexity, while several metrics such as time-to-market, reliability, safety and performance should be considered during the design of such systems. A component-based design which enables the migration of its components between hardware and software can cope to achieve such metrics. To enable that, the authors...

    Provided By International Federation for Information Processing

  • White Papers // Jun 2008

    Using Imprecise Computation Techniques for Power Management in Real-Time Embedded Systems

    Embedded systems present severe limitations in terms of processing and memory capabilities and are often powered by batteries, making energy an important resource to be managed. This work explores energy as a parameter for Quality of Service (QoS) of embedded systems. The goal is to guarantee the battery lifetime specified...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2008

    Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques

    Recently, active worms have done significant damage due to their rapid propagation over the Internet. The authors studied propagation mechanisms of active worms employing single target discovery technique and various combinations of two or three different target discovery techniques from attackers' perspective. They performed a series of simulation experiments to...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2012

    Secure Client Puzzles Based on Random Beacons

    Denial of Service (DoS) attacks pose a fast-growing threat to network services in the Internet, but also corporate Intranets and public local area networks like Wi-Fi hotspots may be affected. Especially protocols that perform authentication and key exchange relying on expensive public key cryptography are likely to be preferred targets....

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Survivable Virtual Network Embedding

    Network virtualization can offer more flexibility and better manageability for the future Internet by allowing multiple heterogeneous Virtual Networks (VN) to coexist on a shared Infrastructure Provider (InP) network. A major challenge in this respect is the VN embedding problem that deals with the efficient mapping of virtual resources on...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Dynamic Service Placement in Shared Service Hosting Infrastructures

    Large-scale shared service hosting environments, such as content delivery networks and cloud computing, have gained much popularity in recent years. A key challenge faced by service owners in these environments is to determine the locations where service instances (e.g. virtual machine instances) should be placed such that the hosting cost...

    Provided By International Federation for Information Processing

  • White Papers // May 2008

    On the Probability of Finding Non-Interfering Paths in Wireless Multihop Networks

    Multipath routing can improve system performance of capacity-limited wireless networks through load balancing. However, even with a single source and destination, intra-flow and inter-flow interference can avoid any performance improvement. In this paper, the authors show that establishing non-interfering paths can, in theory, leverage this issue. In practice however, finding...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2008

    Deadline Probing: Towards Timely Cognitive Wireless Network

    A confidential and effective probing is fundamental to a cooperative and cognitive wireless network. Previous seminar works are not deadline sensitive, and often suffer from highly dynamic multi-channel environments. As they focus more on transmitting packets with the optimal channel, resources are not efficiently used when sufficient channels are available...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2011

    A Middleware Layer for Flexible and Cost-Efficient Multi-Tenant Applications

    Application-level multi-tenancy is an architectural design principle for Software-as-a-Service applications to enable the hosting of multiple customers (or tenants) by a single application instance. Despite the operational cost and maintenance benefits of application-level multi-tenancy, the current middleware component models for multi-tenant application design are inflexible with respect to providing different...

    Provided By International Federation for Information Processing

  • White Papers // May 2011

    On the Uplink Performance of TCP in Multi-Rate 802.11 WLANs

    IEEE 802.11 defines several physical layer data rates to provide more robust communication by falling back to a lower rate in the presence of high noise levels. The choice of the current rate can be automatized; e.g., Auto-Rate Fallback (ARF) is a well-known mechanism in which the sender adapts its...

    Provided By International Federation for Information Processing

  • White Papers // May 2013

    Throughput Regions and Optimal Policies in Wireless Networks With Opportunistic Routing

    Opportunistic routing in wireless networks has been proposed as a method to combat the volatility of wireless links, by leveraging their broadcast nature and choosing the next hop for each transmitted packet post-facto, using the actual reception outcomes at the respective neighbors, rather than based on a priori information. Much...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2011

    Observations on e-Business Implementation Capabilities in Heterogeneous Business Networks

    This paper was to understand the factors that hinder large industry organizations in implementing e-Business solutions. The study included 4 organizations that operated in heterogeneous business networks consisting also of small partners. Interviews were conducted with managers of IT, purchasing and business development. The results indicate that the organizations faced...

    Provided By International Federation for Information Processing

  • White Papers // Dec 2008

    Process Mining Towards Semantics

    Process mining techniques target the automatic discovery of information about process models in organizations. The discovery is based on the execution data registered in event logs. Current techniques support a variety of practical analysis, but they are somewhat limited because the labels in the log are not linked to any...

    Provided By International Federation for Information Processing

  • White Papers // Sep 2012

    Mappings From BPEL to PMR for Business Process Registration

    In order to facilitate business collaboration and interoperation in virtual enterprises, it is crucial to discover appropriate business processes modeled in different languages and stored in different repositories. For this purpose, it is more efficient to register existent process models into a common process model registry, rather than defining numerous...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2009

    Supporting Cross-Organizational Process Control

    E-contracts express the rights and obligations of parties through a formal, digital representation of the contract provisions. In process intensive relationships, e-contracts contain business processes that a party promises to perform for the counter party, optionally allowing monitoring of the execution of the promised processes. In this paper, the authors...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2012

    Statelets: Coordination of Social Collaboration Processes

    Today people work together across time, space, cultural and organizational boundaries. To simplify and automate the work, collaboration employs a broad range of tools, such as project management software, groupware, social networking services, or wikis. For a collaboration to be effective, the actions of collaborators need to be properly coordinated,...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2006

    Attack Graph Based Evaluation of Network Security

    The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs (trees, nets), the subsequent checking of various properties of these graphs, and determining security metrics which can explain possible ways to increase security level. The paper suggests a new...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2010

    Towards Vulnerability Prevention in Autonomic Networks and Systems

    The autonomic paradigm has been introduced in order to cope with the growing complexity of management. In that context, autonomic networks and systems are in charge of their own configuration. However, the changes that are operated by these environments may generate vulnerable configurations. In the meantime, a strong standardization effort...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2007

    Self-Authorized Public Key Management for Home Networks

    In this paper, the authors describe the key management method which allows secure communication channels between devices in home networks. Home network technologies have developed to enable various kinds of home devices to access the digital information between the devices. Without security framework, however, the digital information including a user's...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2009

    WReX: A Scalable Middleware Architecture to Enable XML Caching for Web-Services

    Web service caching, i.e., caching the responses of XML web service requests, is needed for designing scalable web service architectures. Such caching of dynamic content requires maintaining the caches appropriately to reflect dynamic updates to the back-end data source. In the database, especially relational, context, extensive research has addressed the...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2009

    TIUPAM: A Framework for Trustworthiness-Centric Information Sharing

    Information is essential to decision making. Nowadays, decision makers are often overwhelmed with large volumes of information, some of which may be inaccurate, incorrect, inappropriate, misleading, or maliciously introduced. With the advocated shift of information sharing paradigm from "Need to know" to "need to share" this problem will be further...

    Provided By International Federation for Information Processing

  • White Papers // Nov 2009

    Why Do Upgrades Fail And What Can We Do About It?

    Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading cause of upgrade failures. The authors propose a novel upgrade-centric fault model, based on data from three independent sources, which focuses on the impact of procedural errors rather...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2010

    Distributed and Secure Access Control in P2P Databases

    The intent of Peer Data Management Systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to restrict the access to authorized parties. In this paper, the authors study a distributed access control model, where data items are stored,...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2009

    CHAP: Enabling Efficient Hardware-Based Multiple Hash Schemes for IP Lookup

    Building a high performance IP lookup engine remains a challenge due to increasingly stringent throughput requirements and the growing size of IP tables. An emerging approach for IP lookup is the use of set associative memory architecture, which is basically a hardware implementation of an open addressing hash table with...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2008

    Availability Analysis of GMPLS Connections Based on Physical Network Topology

    This paper presents a study of connection availability in GMPLS over Optical Transport Networks (OTN) taking into account different network topologies. Two basic path protection schemes are considered and compared with the no protection case. The selected topologies are heterogeneous in geographic coverage, network diameter, link lengths, and average node...

    Provided By International Federation for Information Processing

  • White Papers // May 2009

    Video Broadcasting to Heterogeneous Mobile Devices

    The authors study the problem of broadcasting multiple scalable video streams to heterogeneous mobile devices, which have limited energy budgets. They show that scalable video streams should be broadcast in a different manner than nonscalable streams; otherwise energy of mobile devices could be wasted. They propose an efficient broadcast scheme...

    Provided By International Federation for Information Processing

  • White Papers // Sep 2009

    Exploring the Design Space for Network Protocol Stacks on Special - Purpose Embedded Systems

    Many special-purpose embedded systems such as automobiles and aircrafts consist of multiple embedded controllers connected through embedded network interconnect. Such network interconnects have particular characteristics and thus have different communication requirements. Accordingly, the authors need to frequently implement new protocol stacks for embedded systems. Implementing new protocol stacks on embedded...

    Provided By International Federation for Information Processing

  • White Papers // Sep 2008

    Resolving Performance Anomaly Using ARF-Aware TCP

    In this paper, the authors propose ARF-aware TCP that resolves the performance anomaly in 802.11 WLAN networks. Performance anomaly is a network symptom that fairness among the nodes is broken when multiple nodes in the same channel have different link rates. Recent studies on the performance anomaly focus on QoS...

    Provided By International Federation for Information Processing

  • White Papers // Oct 2010

    Kevlar: A Flexible Infrastructure for Wide-Area Collaborative Applications

    While web services ensure interoperability and extensibility for networked applications, they also complicate the deployment of highly collaborative systems, such as virtual reality environments and massively multiplayer online games. Quite simply, such systems often manifest a natural peer-to-peer structure. This conflicts with web services' imposition of a client-server communication model,...

    Provided By International Federation for Information Processing

  • White Papers // May 2008

    Performance Evaluation and Enhancement of Surface Coverage Relay Protocol

    Area coverage protocols aim at turning off redundant sensor nodes while ensuring full coverage of the area by the remaining active nodes. Connectivity of the active nodes subset must also be provided so that monitoring reports can reach the sink stations. Existing solutions hardly address these two issues as a...

    Provided By International Federation for Information Processing

  • White Papers // May 2012

    Remedy: Network-Aware Steady State VM Management for Data Centers

    Steady state VM-management in data centers should be network-aware so that VM migrations do not degrade network performance of other flows in the network, and if required, a VM migration can be intelligently orchestrated to decongest a network hotspot. Recent research in network-aware management of VMs has focused mainly on...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2011

    VMFlow: Leveraging VM Mobility to Reduce Network Power Costs in Data Centers

    Networking costs play an important role in the overall costs of a modern data center. Network power, for example, has been estimated at 10-20% of the overall data center power consumption. Traditional power saving techniques in data centers focus on server power reduction through Virtual Machine (VM) migration and server...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2012

    Trust Model for Optimized Cloud Services

    Cloud computing with its inherent advantages draws attention for business critical applications, but concurrently expects high level of trust in cloud service providers. Reputation-based trust is emerging as a good choice to model trust of cloud service providers based on available evidence. Many existing reputation based systems either ignore or...

    Provided By International Federation for Information Processing

  • White Papers // Jul 2012

    Implementation and Evaluation of Coupled Congestion Control for Multipath TCP

    Multipath TCP (MPTCP) is an experimental protocol currently under standardization in the IETF. MPTCP allows to use multiple TCP connections for one data transmission if at least one of the endpoints is multi-homed. For example, this can be a mobile device with a Wi-Fi and a 3G interface. It is...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2012

    Migrating a Legacy Web-Based Document-Analysis Application to Hadoop and HBase: An Experience Report

    Migrating a legacy application to a more modern computing platform is a recurring software-development activity. This paper describes the authors' experience with a contemporary rendition of this activity, migrating a web-based system to a service-oriented application on two different cloud software platforms, Hadoop and HBase. Using the case study as...

    Provided By International Federation for Information Processing

  • White Papers // Aug 2012

    An Architecture for Overlaying Private Clouds on Public Providers

    Organizations shifting to a public cloud infrastructure face potential hurdles regarding control and security, and must acquire a new set of best practices regarding developing and deploying to a cloud infrastructure. The authors propose a reference architecture for a virtual private cloud built on cross-provider on-demand compute instances, with a...

    Provided By International Federation for Information Processing

  • White Papers // Mar 2009

    Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System

    Network Coordinate (NC) system allows efficient Internet distance prediction with scalable measurements. Most of the NC systems are based on embedding hosts into a low dimensional Euclidean space. Unfortunately, the accuracy of predicted distances is largely hurt by the persistent occurrence of Triangle Inequality Violation (TIV) in measured Internet distances....

    Provided By International Federation for Information Processing

  • White Papers // Jun 2010

    Towards a P2P-Based Deployment of Network Management Information

    Standard static centralized network management approaches are unsuitable for managing large, dynamic and distributed networks. Some decentralized approaches based on the P2P model have emerged to overcome the limitations of these centralized approaches like lack of scalability and fault-tolerance. However, the authors do not address issues related to the deployment...

    Provided By International Federation for Information Processing

  • White Papers // May 2009

    A Policy-Driven Network Management System for the Dynamic Configuration of Military Networks

    Military networks constantly evolve to accommodate state-of-the-art technological developments across both military and commercial systems. Operating and maintaining such complex networks is no longer a trivial task. This paper presents a policy-based network management system for military networks which allows non-technical personnel (e.g., the military commander) to guide the network...

    Provided By International Federation for Information Processing

  • White Papers // Apr 2012

    HyperForce: Hypervisor-enForced Execution of Security-Critical Code

    The sustained popularity of the cloud and cloud-related services accelerate the evolution of virtualization-enabling technologies. Modern off-the-shelf computers are already equipped with specialized hardware that enables a hypervisor to manage the simultaneous execution of multiple operating systems. Researchers have proposed security mechanisms that operate within such a hypervisor to protect...

    Provided By International Federation for Information Processing