John Wiley & Sons

Displaying 1-40 of 210 results

  • White Papers // Jan 2014

    Stateful Traffic Replay for Web Application Proxies

    It is a common practice to test a network device by replaying network traffic onto it and observe its reactions. Many replay tools support TCP/IP stateful traffic replay and hence can be used to test switches, routers, and gateway devices. However, they often fail if the Device Under Test (DUT)...

    Provided By John Wiley & Sons

  • White Papers // Jan 2014

    A Survey of QoS Enhancements for IEEE 802.11 Wireless LAN

    Quality of Service (QoS) is a key problem of today's IP networks. Many frameworks (IntServ, DiffServ, MPLS, etc.) have been proposed to provide service differentiation in the Internet. At the same time, the Internet is becoming more and more heterogeneous due to the recent explosion of wireless networks. In wireless...

    Provided By John Wiley & Sons

  • White Papers // Dec 2013

    Simulatable and Secure Certificate-Based Threshold Signature Without Pairings

    "The authors propose the notion and define the security model of a certificate-based threshold signature. The model is a general model that allows both the master secret key and user secret keys to be determined and distributed to the corresponding participators. Furthermore, the model can be easily converted into an...

    Provided By John Wiley & Sons

  • White Papers // Dec 2013

    Geometric Analysis of Distributed Power Control and Mobius MAC Design

    In this paper, the authors present a geometric analysis of the convergence condition for the Foschini-Miljanic power control algorithm. The Mobius transform is exploited for the first time to analyze the convergence conditions of the power control algorithm. A novel MAC scheme based on the Mobius transform is proposed for...

    Provided By John Wiley & Sons

  • White Papers // Nov 2013

    A New Biometric Identity Based Encryption Scheme Secure Against DoS Attacks

    Recently, the author proposed an efficient biometric Identity Based Encryption (IBE) scheme called BIO-IBE using the sakai kasahara key construction and proves its security in the random oracle model based on the well-exploited k-BDHI computational problem. Despite its efficiency compared to other fuzzy IBE systems implemented for biometric identities, BIO-IBE...

    Provided By John Wiley & Sons

  • White Papers // Oct 2013

    Evolution and Future Trends of Research in Cognitive Radio: A Contemporary Survey

    For wireless communications, the right to access the spectrum or license is generally defined by frequency, space, transmission power, spectrum owner (i.e., licensee), type of use, and the duration of license. The Cognitive Radio (CR) paradigm for designing next-generation wireless communications systems is becoming increasingly popular, and different aspects of...

    Provided By John Wiley & Sons

  • White Papers // Sep 2013

    Tridiagonalization of a Dense Symmetric Matrix on Multiple GPUs and Its Application to Symmetric Eigenvalue Problems

    For software to fully exploit the computing power of emerging heterogeneous computers, not only must the required computational kernels be optimized for the specific hardware architectures but also an effective scheduling scheme is needed to utilize the available heterogeneous computational units and to hide the communication between them. As a...

    Provided By John Wiley & Sons

  • White Papers // Aug 2013

    Secure Universal Designated Verifier Identity-Based Signcryption

    The researcher introduced the notion of Universal Designated Verifier Signature (UDVS), which allows a signature holder, who receives a signature from the signer, to convince a designated verifier whether he is possession of a signer's signature; at the same time, the verifier cannot transfer such conviction to anyone else. These...

    Provided By John Wiley & Sons

  • White Papers // Aug 2013

    Contention Management in Federated Virtualized Distributed Systems: Implementation and Evaluation

    In this paper, the authors describe creation of a contention-aware environment in a large-scale distributed system where the contention occurs to access resources between external and local requests. To resolve the contention, they propose and implement a preemption mechanism in the InterGrid platform, which is a platform for large-scale distributed...

    Provided By John Wiley & Sons

  • White Papers // Jun 2013

    Using Latency as a QoS Indicator for Global Cloud Computing Services

    Many globally distributed Cloud Computing (CC) applications and services running over the Internet, between globally dispersed clients and servers, will require certain levels of QoS in order to deliver and give a sufficiently smooth user experience. This would be essential for real-time streaming multimedia applications such as online gaming and...

    Provided By John Wiley & Sons

  • White Papers // Jun 2013

    Reliability-Aware Server Consolidation for Balancing Energy-Lifetime Tradeoff in Virtualized Cloud Datacenters

    Server consolidation using virtualization technologies allow large-scale datacenters to improve resource utilization and energy efficiency. However, most existing consolidation strategies solely focused on balancing the tradeoff between performance Service-Level-Agreements (SLAs) desired by cloud applications and energy costs consumed by hosting servers. With the presence of fluctuating workloads in datacenters, the...

    Provided By John Wiley & Sons

  • White Papers // Jun 2013

    On Construction of Heuristic QoS Bandwidth Management in Clouds

    In recent years, cloud computing has become popular and its applications widespread. Thus, there exists a common concern, that is, how to arrange and monitor various resources in the cloud computing environment. In the literature, Ganglia and Network Weather Service (NWS) were used to monitor and gather node status and...

    Provided By John Wiley & Sons

  • White Papers // May 2013

    Cooperative and Reactive Scheduling in Large-Scale Virtualized Platforms with DVMS

    One of the principal goals of Cloud Computing is the outsourcing of the hosting of data and applications, thus enabling a per-usage model of computation. Data and applications may be packaged in Virtual Machines (VM), which are themselves hosted by nodes, i.e., Physical Machines (PM). Several frameworks have been designed...

    Provided By John Wiley & Sons

  • White Papers // Apr 2013

    An Authenticated Group Key Distribution Mechanism Using Theory of Numbers

    A group key distribution protocol can enable members of a group to share a secret group key and use it for secret communications. The researchers proposed an authenticated group key distribution protocol using polynomial-based secret sharing scheme. Recently, Guo and Chang proposed a similar protocol based on the generalized Chinese...

    Provided By John Wiley & Sons

  • White Papers // Mar 2013

    Secure and Transparent Network Traffic Replay, Redirect, and Relay in a Dynamic Malware Analysis Environment

    Dynamic analysis is typically performed in a closed network environment to prevent the malware under analysis from attacking machines on the internet. However, many of today's malwares require internet connectivity to operate and to be thoroughly analyzed in a closed network environment. The authors propose a secure and transparent network...

    Provided By John Wiley & Sons

  • White Papers // Mar 2013

    Securing Virtual Private LAN Service by Efficient Key Management

    Virtual Private Local area network Service (VPLS) is a layer 2 service provider-provisioned virtual private network service. Security is one of the key system requirements of a VPLS because it delivers the frames via an untrusted network. Several VPLS architectures are proposed during the recent years. However, many of them...

    Provided By John Wiley & Sons

  • White Papers // Mar 2013

    Broadcasting With Hard Deadlines in Wireless Multi-Hop Networks Using Network Coding

    Broadcasting with network coding mixes packets to minimize the number of transmissions, which improves the energy efficiency of wireless networks. On the other hand, delaying the transmissions increases coding opportunities at intermediate nodes, but increases the delay of packets. In this paper, the authors consider these two contradicting factors and...

    Provided By John Wiley & Sons

  • White Papers // Feb 2013

    Modeling Tools for Detecting DoS Attacks in WSNs

    Detecting Denial-of-Service (DoS) attacks and reducing the energy consumption are two important and frequent requirements in Wireless Sensor Networks (WSNs). In this paper, the authors propose an energy-preserving solution to detect compromised nodes in hierarchically clustered WSNs. DoS detection is based on using dedicated inspector nodes (cNodes) whose role is...

    Provided By John Wiley & Sons

  • White Papers // Jan 2013

    Anomaly-Based Intrusion Detection of Jamming Attacks, Local Versus Collaborative Detection

    The authors present intrusion detection algorithms to detect physical layer jamming attacks in wireless networks. They compare the performance of local algorithms on the basis of the Signal-to-Interference-plus-Noise Ratio (SINR) executing independently at several monitors, with a collaborative detection algorithm that fuses the outputs provided by these algorithms. The local...

    Provided By John Wiley & Sons

  • White Papers // Jan 2013

    Resource Provisioning Based on Preempting Virtual Machines in Distributed Systems

    Resource provisioning is one of the main challenges in large-scale distributed systems such as federated Grids. Recently, many resource management systems in these environments have started to use the lease abstraction and Virtual Machines (VMs) for resource provisioning. In the large-scale distributed systems, resource providers serve requests from external users...

    Provided By John Wiley & Sons

  • White Papers // Dec 2012

    A Scalable, Efficient and Informative Approach for Anomaly-Based Intrusion Detection Systems : Theory and Practice

    In this paper, the authors present the design and implementation of a new approach for anomaly detection and classification over high speed networks. The proposed approach is based first of all on a data reduction phase through flow sampling by focusing mainly on short lived flows. The second step is...

    Provided By John Wiley & Sons

  • White Papers // Nov 2012

    Micro-Transactions for Concurrent Data Structures

    Transactional memory is a promising technique for enforcing disciplined access to shared data in a multiprocessor system. Transactional memory simplifies the implementation of a variety of concurrent data structures. In this paper, the authors study the benefits of a modest, real-time aware, hardware implementation of transactional memory that they call...

    Provided By John Wiley & Sons

  • White Papers // Nov 2012

    Bandwidth-Aware Divisible Task Scheduling for Cloud Computing

    Task scheduling is a fundamental issue in achieving high efficiency in cloud computing. However, it is a big challenge for efficient scheduling algorithm design and implementation (as general scheduling problem is NP-complete). Most existing task-scheduling methods of cloud computing only consider task resource requirements for CPU and memory, without considering...

    Provided By John Wiley & Sons

  • White Papers // Nov 2012

    Inter-Cloud Architectures and Application Brokering: Taxonomy and Survey

    Though Cloud computing itself has many open problems, researchers in the field have already made the leap to envision Inter-Cloud computing. Their goal is to achieve better overall Quality of Service (QoS), reliability and cost efficiency by utilizing multiple clouds. Inter-Cloud research is still in its infancy and the body...

    Provided By John Wiley & Sons

  • White Papers // Oct 2012

    A Security Framework for Wireless Mesh Networks

    The class of Wireless Mesh Networks (WMN) supports an ample set of applications including wireless community networks, radio access networks in rural or metropolitan areas, or wireless backbones for factory/process automation. Guaranteeing security is crucial for within these application scenarios. While contemporary wireless technologies, such as the IEEE 802.16 or...

    Provided By John Wiley & Sons

  • White Papers // Oct 2012

    Energy-Efficient PHY-Layer Packet Authenticator for Machine-to-Machine Networks

    Machine-To-Machine (M2M) networks are spreading over every sector of the people society due to their self-organization capabilities. In these networks, thousands of devices are left unattended for years of operation without the possibility of human intervention and thus, security issues must be addressed in order to ensure reliable communications. Due...

    Provided By John Wiley & Sons

  • White Papers // Aug 2012

    Optimal Online Deterministic Algorithms and Adaptive Heuristics for Energy and Performance Efficient Dynamic Consolidation of Virtual Machines in Cloud Data Centers

    The rapid growth in demand for computational power driven by modern service applications combined with the shift to the Cloud computing model have led to the establishment of large-scale virtualized data centers. Such data centers consume enormous amounts of electrical energy resulting in high operating costs and carbon dioxide emissions....

    Provided By John Wiley & Sons

  • White Papers // Aug 2012

    Accelerating R-Based Analytics on the Cloud

    This paper addresses the problem of harnessing cloud-based infrastructure for the kind of analytical workloads that abound in application domains ranging from computational finance and risk analytics to engineering and manufacturing. Often in this setting, software is not developed by a professional programmer, but on an ad hoc basis by...

    Provided By John Wiley & Sons

  • White Papers // Jul 2012

    Characterizing the Greedy Behavior in Wireless Ad Hoc Networks

    While the problem of greedy behavior at the MAC layer has been widely explored in the context of Wireless Local Area Networks (WLAN), its study for multi-hop wireless networks still almost an unexplored and unexplained problem. Indeed, in a wireless local area network, an access point mostly forwards packets sent...

    Provided By John Wiley & Sons

  • White Papers // Jun 2012

    Using Body Sensor Networks for Motion Detection: A Cluster-Based Approach for Green Radio

    Body Sensor Networks (BSN) are an emerging application that places sensors on the human body. Given that a BSN is typically powered by a battery, one of the most critical challenges is how to prolong the lifetime of all sensor nodes. Recently, using clusters to reduce the energy consumption of...

    Provided By John Wiley & Sons

  • White Papers // Jun 2012

    Transformer: An Adaptation Framework Supporting Contextual Adaptation Behavior Composition

    As software systems today increasingly operate in changing and complex environments, they are expected to dynamically adapt to the changing environments sometimes with multiple co-existing adaptation goals. This paper proposes an adaptation framework to facilitate adaptation with multiple concerns by using reusable and composable adaptation modules. Rather than using one-size-fits-all...

    Provided By John Wiley & Sons

  • White Papers // Jun 2012

    Cramer - Rao Bound Based Mean-Squared Error and Throughput Analysis of Superimposed Pilots for Semi-Blind Multiple-Input Multiple-Output Wireless Channel Estimation

    This paper presents a study of the Mean-Squared Error (MSE) and throughput performance of Superimposed Pilots (SP) for the estimation of a Multiple-Input Multiple-Output (MIMO) wireless channel. The Cramer-Rao Bound (CRB) is derived for SP based estimation of the MIMO channel matrix. Employing the CRB analysis, it is proved that...

    Provided By John Wiley & Sons

  • White Papers // Jun 2012

    Homomorphic A-Codes for Network Coding

    Authentication codes (A-codes) are a well studied technique to provide unconditionally secure authentication. An A-code is defined by a map that associates a pair formed by a message and a key to a tag. A-codes linear in the keys have been studied for application to distributed authentication schemes. In this...

    Provided By John Wiley & Sons

  • White Papers // May 2012

    Adapting FreeRTOS for Multicore: an Experience Report

    Multicore processors are ubiquitous. Their use in embedded systems is growing rapidly and, given the constraints on uniprocessor clock speeds, their importance in meeting the demands of increasingly processor - intensive embedded applications cannot be understated. In order to harness this potential, system designers need to have available to them...

    Provided By John Wiley & Sons

  • White Papers // May 2012

    Business Process Management-Are You Ready for the Future?

    Business process management is the discipline that encompasses the analysis, modelling, implementation, execution, monitoring/control and continuous improvement of business processes. Methods and models developed for this management activity offer wide-ranging assistance to, and potential for, most organizations, yet even a general awareness of them seems to be non-existent in many...

    Provided By John Wiley & Sons

  • White Papers // Apr 2012

    A Component-Based Middleware Platform for Reconfigurable Service-Oriented Architectures

    The Service Component Architecture (SCA) is a technology-independent standard for developing distributed Service-Oriented Architectures (SOA). The SCA standard promotes the use of components and architecture descriptors, and mostly covers the life-cycle steps of implementation and deployment. Unfortunately, SCA does not address the governance of SCA applications and provides no support...

    Provided By John Wiley & Sons

  • White Papers // Mar 2012

    EMUSIM: An Integrated Emulation and Simulation Environment for Modeling, Evaluation, and Validation of Performance of Cloud Computing Applications

    Cloud computing allows the deployment and delivery of application services for users worldwide. SaaS providers with limited upfront budget can take advantage of Cloud computing and lease the required capacity in a pay-as-you-go basis, which also enables flexible and dynamic resource allocation according to service demand. One key challenge potential...

    Provided By John Wiley & Sons

  • White Papers // Feb 2012

    Detecting SYN Flooding Attacks Based on Traffic Prediction

    SYN flooding attacks are a common type of distributed denial-of-service attacks. Up to now, many defense schemes have been proposed against SYN flooding attacks. Traditional defense schemes rely on passively sniffing an attacking signature and are inaccurate in the early stages of an attack. These schemes are effective only at...

    Provided By John Wiley & Sons

  • White Papers // Jan 2012

    Application Layer Forward Error Correction for Multicast Streaming Over LTE Networks

    The next step beyond third generation mobile networks is the Third Generation Partnership Project standard, named Long Term Evolution. A key feature of Long Term Evolution is the enhancement of Multimedia Broadcast and Multicast Services (MBMS), where the same content is transmitted to multiple users located in a specific service...

    Provided By John Wiley & Sons

  • White Papers // Dec 2011

    Exploiting Resource Heterogeneity in Delay-Tolerant Networks

    Routing in delay and Disruption-Tolerant Networks (DTNs) relies on intermediary nodes, called custodians, to deliver messages to destination. However, nodes usually differ significantly in terms of available resources: energy, buffer space, and bandwidth. Routing algorithms need to make the most efficient use of custodian resources while also making sure those...

    Provided By John Wiley & Sons

  • White Papers // Jul 2011

    Closed-Form Analysis of Multibranch Switched Diversity With Noncoherent and Differentially Coherent Detection

    Exact closed-form analytical expressions are derived for the average bit error probability of multi-branch switched diversity systems over independent and identically Nakagami-m distributed fading channels. Practical schemes that use non-coherent or differentially coherent symbol detection are considered. The general bit error probability expression derived in this paper includes as particular...

    Provided By John Wiley & Sons

  • White Papers // Apr 2009

    Performance Tradeoffs Among Low-Complexity Detection Algorithms for MIMO-LTE Receivers

    The upcoming Third-Generation Partnership Project - Long-Term Evolution (3GPP-LTE) cellular standard will employ spatial multiplexing to significantly increase the data rates. Detection of the spatially multiplexed signals is an essential issue in the design of an LTE receiver. In this paper, the authors evaluate the performance - complexity tradeoffs for...

    Provided By John Wiley & Sons

  • White Papers // Dec 2009

    Audit-Firm Group Appointment: An Artificial Intelligence Approach

    Auditor appointment can be regarded as a matter of pursued audit quality and is driven by several factors. The adoption of an effective auditor procurement process increases the likelihood that a company will engage the right auditor at a fair price. In this paper, three techniques derived from Artificial Intelligence...

    Provided By John Wiley & Sons

  • White Papers // Apr 2010

    On the Fairness of Return Channel Capacity Allocation in DVB-RCS-Based Satellite Networks

    Broadband Satellite Access (BSA) systems can form an alternative path for the provision of Internet access in areas with poor network infrastructure. The DVB-RCS standard introduced the specifications of an interaction channel for two-way BSA networks. In this paper, a new dynamic scheduling strategy for the interaction channel of GEO...

    Provided By John Wiley & Sons

  • White Papers // Jul 2010

    Location-Aided Medium Access Control for Low Data Rate UWB Wireless Sensor Networks

    This paper presents a distributed Medium Access Control (MAC) protocol for low data rate Ultra-WideBand (UWB) Wireless Sensor Networks (WSNs), named LA-MAC. Current MAC proposal is closely coupled to the IEEE 802.15.4a physical layer and it is based on its Impulse-Radio (IR) paradigm. LA-MAC protocol amplifies its admission control mechanism...

    Provided By John Wiley & Sons

  • White Papers // Sep 2009

    Recommending Change Clusters to Support Software Investigation: An Empirical Study

    During software maintenance tasks, developers often spend a valuable amount of effort investigating source code. This effort can be reduced if tools are available to help developers navigate the source code effectively. The authors studied to what extent developers can benefit from information contained in clusters of change sets to...

    Provided By John Wiley & Sons

  • White Papers // Dec 2011

    Applying a Metadata Level for Concurrency in Wireless Sensor Networks

    Achieving a clean separation of concerns is a well known approach to improving system adaptability and evolution. The authors propose to apply this principle to run-time reconfigurable component models for networked embedded systems. By separating configuration properties from runtime component instances, they achieve: improved support for concurrent component use, optimized...

    Provided By John Wiley & Sons

  • White Papers // Aug 2010

    Dynamic Region-Based Mobile Multicast

    Traditional mobile multicast schemes have higher multicast tree reconfiguration cost or multicast packet delivery cost. Two costs are very critical because the former affects the service disruption time during handoff while the latter affects the packet delivery delay. Although the Range-Based Mobile Multicast (RBMoM) scheme and its similar schemes offer...

    Provided By John Wiley & Sons

  • White Papers // Aug 2010

    An Embedded DSP Hardware Encryption Module for Secure e-Commerce Transactions

    Cryptography is one of the key elements in providing security for modern e-commerce systems. It is well known that software-based encryption has built-in security weaknesses due to storing and managing digital certificates/keys in a high-risk environment such as a local hard disk or software. This makes embedded hardware encryption a...

    Provided By John Wiley & Sons

  • White Papers // Dec 2010

    A Fingerprint Based Bio-Cryptographic Security Protocol Designed for Client/server Authentication in Mobile Computing Environment

    With fast evolution of mobile devices and mobile network, the need of protecting user sensitive information locally and performing secure user authentication remotely become evermore increasing. Bio-cryptography is emerging as a powerful solution which can combine the advantages of conventional cryptography and biometric security. In this paper, the authors present...

    Provided By John Wiley & Sons

  • White Papers // Dec 2010

    Efficient IEEE 802.11 Handoff Based on a Novel Geographical Fingerprint Scheme

    The effective coverage distance of Wireless LAN (WLAN) being small, users may leave the coverage area of the specific Access Point (AP) from time to time while roaming. However, the wireless network is a shared medium. The air is open for everyone. In general there is collision if a few...

    Provided By John Wiley & Sons

  • White Papers // Dec 2010

    The Digital Forensics of Portable Electronic Communication Devices Based on a Skype IM Session of a Pocket PC for NGC

    Portable electronic communication devices can be used for many purposes and they are capable of integrating with Ubiquitous Computing (UC) infrastructures to carry on mobile multimedia communications. As those devices become prevalent, they incur potential network security threatening to organizations. Nowadays, the Skype is the most popular P2P VoIP application...

    Provided By John Wiley & Sons

  • White Papers // Apr 2010

    A Two-Tier Framework for Transmission-Cost Minimization of High-Performance Communication Applications

    In two-tier High-Performance Networks (HPNs), some facilities are constructed to form a powerful supercomputing environment, and to alleviate server load. Then, the applications are provided by them in co-operated, parallel and distributed manners. A proper way to select facilities is crucial to the performance of two-tier HPNs The problem of...

    Provided By John Wiley & Sons

  • White Papers // Nov 2011

    Tabu Search for Dynamic Spectrum Allocation (DSA) in Cellular Networks

    In this paper, the authors present and analyze a Tabu Search (TS) algorithm for Dynamic Spectrum Allocation (DSA) in cellular networks. They study a case where an operator is providing packet services to the end-users. The objective of the cellular operator is to maximize its reward while taking into account...

    Provided By John Wiley & Sons

  • White Papers // Oct 2009

    Communication Protocols for Vehicular Ad Hoc Networks

    Vehicular networks are envisioned for large scale deployment, and standardization bodies, car manufacturers, and academic researchers are solving a variety of related challenges. After a brief description of Intelligent Transportation System (ITS) architectures and the main already-established low-level standards, this tutorial elaborates on four particular aspects of vehicular networks, which...

    Provided By John Wiley & Sons

  • White Papers // Mar 2010

    An Infrastructure for Detecting and Punishing Malicious Hosts Using Mobile Agent Watermarking

    Mobile agents are software entities consisting of code, data, and state that can migrate autonomously from host to host executing their code. In such scenario there are some security issues that must be considered. In particular, this paper deals with the protection of mobile agents against manipulation attacks performed by...

    Provided By John Wiley & Sons

  • White Papers // Feb 2011

    User Identification and Anonymization in 802.11 Wireless LANs

    Privacy issues have been a serious concern for 802.11Wireless LAN users. Prior research on privacy issues usually focuses on pseudonym techniques, where the unique, consistent explicit identifiers such as MAC addresses from the users can be frequently changed, and thus it is challenging to track users through those always changing...

    Provided By John Wiley & Sons

  • White Papers // Jun 2010

    Lightweight and Provably Secure User Authentication With Anonymity for the Global Mobility Network

    Seamless roaming in the GLObal MObility NETwork (GLOMONET) is highly desirable for mobile users, although their proper authentication is challenging. This is because not only are wireless networks susceptible to attacks, but also mobile terminals have limited computational power. Recently, some authentication schemes with anonymity for the GLOMONET have been...

    Provided By John Wiley & Sons

  • White Papers // Dec 2011

    Exploiting Resource Heterogeneity in Delay-Tolerant Networks

    Routing in delay and Disruption-Tolerant Networks (DTNs) relies on intermediary nodes, called custodians, to deliver messages to destination. However, nodes usually differ significantly in terms of available resources: energy, buffer space, and bandwidth. Routing algorithms need to make the most efficient use of custodian resources while also making sure those...

    Provided By John Wiley & Sons

  • White Papers // Sep 2010

    Scalable Location Guide Overlay Multicast in Mobile Ad Hoc Networks Using Tree Partition Scheme

    Nodes mobility brings flinty challenges to multicast in Mobile Ad hoc NETworks (MANETs). To track nodes mobility, flooding messages are widely used for data delivery structure construction and maintenance in many multicast protocols. These periodic flooding messages significantly consume network resources, such as energy and bandwidth, and result in network...

    Provided By John Wiley & Sons

  • White Papers // Jun 2012

    Homomorphic A-Codes for Network Coding

    Authentication codes (A-codes) are a well studied technique to provide unconditionally secure authentication. An A-code is defined by a map that associates a pair formed by a message and a key to a tag. A-codes linear in the keys have been studied for application to distributed authentication schemes. In this...

    Provided By John Wiley & Sons

  • White Papers // Oct 2009

    New Deterministic and Stochastic Simulation Models for Non-Isotropic Scattering Mobile-to-Mobile Rayleigh Fading Channels

    For the practical simulation and performance evaluation of Mobile-To-Mobile (M2M) communication systems, it is desirable to develop accurate M2M channel simulation models for more realistic scenarios of non-isotropic scattering. In this paper, by using a 'Double-ring' concept to describe M2M non-isotropic scattering environments, the authors propose new deterministic and stochastic...

    Provided By John Wiley & Sons

  • White Papers // Mar 2012

    EMUSIM: An Integrated Emulation and Simulation Environment for Modeling, Evaluation, and Validation of Performance of Cloud Computing Applications

    Cloud computing allows the deployment and delivery of application services for users worldwide. SaaS providers with limited upfront budget can take advantage of Cloud computing and lease the required capacity in a pay-as-you-go basis, which also enables flexible and dynamic resource allocation according to service demand. One key challenge potential...

    Provided By John Wiley & Sons

  • White Papers // Apr 2009

    Ranging Error-Tolerable Localization in Wireless Sensor Networks With Inaccurately Positioned Anchor Nodes

    Localization is essential for Wireless Sensor Networks (WSNs). It is to determine the positions of sensor nodes based on incomplete mutual distance measurements. In this paper, to measure the accuracy of localization algorithms, a ranging error model for Time Of Arrival (TOA) estimation is given, and the Cramer-Rao Bound (CRB)...

    Provided By John Wiley & Sons

  • White Papers // Jan 2010

    On the Quality of Broadcast Services in Vehicular Ad Hoc Networks

    The authors investigate the broadcast problem in suburban and highway inter-vehicular networks, aiming at providing a definitive comparison of two antipodean broadcast algorithm classes: the first one makes use of some instantaneous information locally available at the vehicles (such as vehicle position and speed), while the second one relies on...

    Provided By John Wiley & Sons

  • White Papers // Oct 2009

    HPCTOOLKIT: Tools for Performance Analysis of Optimized Parallel Programs

    HPCTOOLKIT is an integrated suite of tools that supports measurement, analysis, attribution, and presentation of application performance for both sequential and parallel programs. HPCTOOLKIT can pinpoint and quantify scalability bottlenecks in fully optimized parallel programs with a measurement overhead of only a few percent. Recently, new capabilities were added to...

    Provided By John Wiley & Sons

  • White Papers // Jul 2009

    Collaborative Attacks in WiMAX Networks

    In this paper, the authors discuss security problems, with a focus on collaborative attacks, in the Worldwide Interoperability for Microwave Access (WiMAX) scenario. The WiMAX protocol suite, which includes but is not limited to DOCSIS, DES, and AES, consists of a large number of protocols. They present briefly the WiMAX...

    Provided By John Wiley & Sons

  • White Papers // Apr 2009

    A Dependency Constraint Language to Manage Object-Oriented Software Architectures

    This paper presents a domain-specific dependency constraint language that allows software architects to restrict the spectrum of structural dependencies, which can be established in object-oriented systems. The ultimate goal is to provide architects with means to define acceptable and unacceptable dependencies according to the planned architecture of their systems. Once...

    Provided By John Wiley & Sons

  • White Papers // Jul 2010

    Coordinated Rescheduling of Bag-of-Tasks for Executions on Multiple Resource Providers

    Meta-schedulers can distribute parts of a Bag-of-Tasks (BoT) application among various resource providers in order to speed up its execution. The expected completion time of the user application is then calculated based on the run time estimates of all applications running and waiting for resources. However, due to inaccurate run...

    Provided By John Wiley & Sons

  • White Papers // Jun 2011

    Cross-Layer Optimisation for Uplink Transmission in OFDMA Cellular Networks With Fixed Relays

    In this paper, the authors consider a cross-layer design aimed to enhance performance for uplink transmission in an Orthogonal Frequency Division Multiple-Access (OFDMA)-based cellular network with fixed relay stations. Because Mobile Stations (MSs) spend most of the power on the uplink transmission, power efficiency resource allocation becomes very important to...

    Provided By John Wiley & Sons

  • White Papers // Jan 2011

    Comparison and Analysis of Greedy Energy-Efficient Scheduling Algorithms for Computational Grids

    A computational grid is a distributed computational network, enabled with software that allows cooperation and the sharing of resources. The energy consumption of these large-scale distributed systems is an important problem. The society becomes more technologically advanced, the size of these computational grids and energy consumption continue to increase. In...

    Provided By John Wiley & Sons

  • White Papers // Oct 2009

    Mobility and Handoff Management in Vehicular Networks: A Survey

    Mobility management is one of the most challenging research issues for vehicular networks to support a variety of Intelligent Transportation System (ITS) applications. The traditional mobility management schemes for Internet and Mobile Ad hoc NETwork (MANET) cannot meet the requirements of vehicular networks, and the performance degrades severely due to...

    Provided By John Wiley & Sons

  • White Papers // Oct 2011

    An Evolutionary Spectrum Approach to Modeling Non-Stationary Fading Channels

    To evaluate mobile communication systems, it is important to develop accurate and concise fading channel models. However, fading encountered in mobile communication is usually non-stationary, and the existing methods can only model quasi-stationary or piecewise-stationary fading instead of general non-stationary fading. To address this, this paper proposes an Evolutionary-Spectrum (ES)...

    Provided By John Wiley & Sons

  • White Papers // Apr 2012

    A Component-Based Middleware Platform for Reconfigurable Service-Oriented Architectures

    The Service Component Architecture (SCA) is a technology-independent standard for developing distributed Service-Oriented Architectures (SOA). The SCA standard promotes the use of components and architecture descriptors, and mostly covers the life-cycle steps of implementation and deployment. Unfortunately, SCA does not address the governance of SCA applications and provides no support...

    Provided By John Wiley & Sons

  • White Papers // Dec 2010

    On Centralized Schedulers for 802.11e WLANs Distribution Versus Grouping of Resources Allocation

    Wireless LAN is becoming a pervasive wireless access technology that can be found in almost any mobile device such as laptops, PDAs, portable game consoles and mobile phones. Each of these groups of devices have a different set of requirements according to their intended use and applications but most of...

    Provided By John Wiley & Sons

  • White Papers // Aug 2009

    Trusted Cognitive Radio Networking

    Networking cognitive radios and nodes from Primary System (PS) results in a heterogeneous coexisting multi-radio wireless network, so that significant network throughput gain can be achieved. However, by investigating Cognitive Radio Network (CRN) architecture, the links in CRNs are unlikely to support complete security check due to link dynamics, opportunistic...

    Provided By John Wiley & Sons

  • White Papers // Mar 2011

    Social-Aware Delay Tolerant Networking for Mobile-to-Mobile File Sharing

    Peer-To-Peer (P2P) overlay networks and Mobile Ad-hoc NETworks (MANETs) share many key characteristics such as self-organization and decentralization; they also face the crucial challenge of providing connectivity in a decentralized, dynamic environment. However, when considering ad-hoc networks composed by mobile devices such as smartphones, the authors cannot rely on the...

    Provided By John Wiley & Sons

  • White Papers // Mar 2009

    Spatial SINR Games of Base Station Placement and Mobile Association

    Wireless mesh networking allows network operators and service providers to offer nearly ubiquitous broadband access at a low cost to customers. In this paper, the authors focus on QoS-aware mesh networks operated by multiple operators in a cooperative manner. In particular, they identify the general security requirements of such networks...

    Provided By John Wiley & Sons

  • White Papers // Nov 2009

    Measurement-Based Link Scheduling for Maritime Mesh Networks With Directional Antennas

    The proliferation of wireless transceivers and the availability of unlicensed band have given a boost to the deployment of wireless networks, with IEEE802.11/WiFi being the major driver in this arena. In this paper, the authors consider a wireless mesh network designed for long distance communication with a typical deployment scenario...

    Provided By John Wiley & Sons

  • White Papers // Jan 2010

    A Pragmatic Approach to Area Coverage in Hybrid Wireless Sensor Networks

    Success of Wireless Sensor Networks (WSN) largely depends on whether the deployed network can provide desired area coverage with acceptable network lifetime. This paper seeks to address the problem of determining the current coverage achieved by the non-deterministic deployment of static sensor nodes and subsequently enhancing the coverage using mobile...

    Provided By John Wiley & Sons