Journal of Universal Computer Science

Displaying 1-40 of 168 results

  • White Papers // Feb 2009

    Protecting Mobile TV Multimedia Content in DVB/GPRS Heterogeneous Wireless Networks

    Normally, the multimedia content provider and network service providers are separated in mobile TV systems. The TV programs are broadcasted from the content provider to the mobile terminals through Digital Video Broadcasting Transmission System for Handheld Terminals (DVB-H), and the access information is unicasted from the service provider to the...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2009

    Agent Platform for Wireless Sensor Network With Support for Cryptographic Protocols

    This paper deals with a description of wireless sensor networks at the beginning. Further follows the introduction to the agent platform suitable for wireless networks. Mobile code and sensor networks suffer from considerable security problems. The proposal of countermeasure is based on combination of smartcards with sensor nodes. Smartcards as...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2010

    Position-Based Routing Protocol for Low Power Wireless Sensor Networks

    This paper presents a table-less position based routing scheme for low power data centric wireless sensor networks. The proposed scheme is localized, uses greedy forwarding approach, and does not rely on neighborhood information. These characteristics reduce the communication overhead (no neighborhood information exchange), make the protocol highly scalable (no routing...

    Provided By Journal of Universal Computer Science

  • White Papers // Dec 2010

    Watermarking Techniques for Relational Databases: Survey, Classification and Comparison

    Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of relational data. Many watermarking techniques have been proposed in the literature to address these purposes. In this paper, the authors survey the current state-of-the-art and they classify them according...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2009

    LCP-Nets: A Linguistic Approach for Non-Functional Preferences in a Semantic SOA Environment

    This paper addresses the problem of expressing preferences among nonfunctional properties of services in a Web service architecture. In such a context, semantic and non-functional annotations are required on service declarations and business process calls to services in order to select the best available service for each invocation. To cope...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2010

    A Model for Capturing and Managing Software Engineering Knowledge and Experience

    During software development projects there is always a particular working "Product" that is generated but rarely managed: the knowledge and experience that team members acquire. This knowledge and experience, if conveniently managed, can be reused in future software projects and be the basis for process improvement initiatives. In this paper,...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2010

    Performance Optimizations for DAA Signatures on Java Enabled Platforms

    With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the computational requirements of public-key cryptosystems are often beyond the constraints embedded processors are bound to. This is especially true for cryptosystems that make heavy use of...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2010

    Towards a Virtual Trusted Platform

    The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisation platform for security sensitive software modules. The amalgam of these technologies allows an attractive off-the-shelf environment, capable of supporting security levels potentially higher than commonly deployed...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2010

    Impact of CPU-Bound Processes on IP Forwarding of Linux and Windows XP

    These days, Commodity-Off-The-Shelf (COTS) hardware and software are used to build high-end and powerful workstations and servers to be deployed in today's local area networks of private homes and small-to medium-sized business. Typically, these servers are multipurpose and shared - running networking functionalities involving IP packet forwarding in addition to...

    Provided By Journal of Universal Computer Science

  • White Papers // Dec 2010

    Integrating Personal Web Data Through Semantically Enhanced Web Portal

    Currently, the World Wide Web is mostly composed of isolated and loosely connected "Data islands". Connecting them together and retrieving only the information that is of interest to the user is the common Web usage process. Creating infrastructure that would support automation of that process by aggregating and integrating Web...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    Redundant Relations in Relational Databases: A Model Theoretic Perspective

    The authors initiate in this paper, the study of a sort of redundancy problem revealed by what they call redundant relations. Roughly, they define a redundant relation in a database instance (dbi) as a k-ary relation R such that there is a first-order query which evaluated in the reduced dbi,...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    Internal Representation of Database Views

    Although a database view embodies partial information about the state of the main schema, the state of the view schema is a quotient (and not a subset) of the state of the main schema. It is the information content of the view state, the set of sentences which are true...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    A Geometrically Enhanced Conceptual Model and Query Language

    Motivated by the authors' experiences with spatial modelling for the sustainable land use initiative they present a Geometrically enhanced ER Model (GERM), which preserves the key principles of entity-relationship modelling and at the same time introduces bulk constructors and geometric features. The model distinguishes between a syntactic level of types...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    XML Database Transformations

    Database transformations provide a unifying umbrella for queries and updates. In general, they can be characterised by five postulates, which constitute the database analogue of Gurevich's sequential ASM paper. Among these postulates the background postulate supposedly captures the particularities of data models and schemata. For the characterisation of XML database...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    Support for Schema Evolution in Data Stream Management Systems

    Unlike DataBase Management Systems (DBMSs), Data Stream Management Systems (DSMSs) do not evaluate queries over static data sets - rather, they continuously produce result streams to standing queries, and often operate in a context where any interruption can lead to data loss. Support for schema evolution in such an environment...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2010

    Developing a Secure Mobile Grid System Through a UML Extension

    The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as those of Grid Computing which are not developed through methodologies that are adapted to their most differentiating features. A systematic development process for Grid systems...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2010

    UML Support for Designing Software Product Lines: The Package Merge Mechanism

    Software product lines have become a successful but challenging approach to software reuse. Some of the problems that hinder the adoption of this development paradigm are the conceptual gap between the variability and design models, as well as the complexity of the traceability management between them. Most current development methods...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2009

    Stability in Heterogeneous Multimedia Networks Under Adversarial Attacks

    A distinguishing feature of today's large-scale platforms for multimedia distribution and communication, such as the Internet, is their heterogeneity, predominantly manifested by the fact that a variety of communication protocols are simultaneously running over different hosts. A fundamental question that naturally arises for such common settings of heterogeneous multimedia systems...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2009

    The Topology Change Attack: Threat and Impact

    Peer-To-Peer (P2P) network has received in past few years a significant attention, especially such file sharing network as eDonkey or BitTorrent. The shift from the classical client-server based paradigm of the Internet, with a clear distinction between information providers and consumers, towards consumers sharing information among each other led to...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2009

    A New Detection Method for Distributed Denial-of-Service Attack Traffic Based on Statistical Test

    This paper has proposed a new detection method for DDoS attack traffic based on two-sample t-test. The authors first investigate the statistics of normal SYN Arrival Rate (SAR) and confirm it follows normal distribution. The proposed method identifies the attack by testing the difference between incoming SAR and normal SAR,...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Advances in Homomorphic Cryptosystems

    During the last few years homomorphic encryption techniques have been studied extensively since they have become more and more important in many different cryptographic protocols such as voting protocols, lottery protocols, anonymity, privacy, and electronic auctions. This paper critically summarizes the current state-of-art of homomorphic cryptosystems. It recalls the basic...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Structural Coverage Criteria for Testing SQL Queries

    Adequacy criteria provide an objective measurement of test quality. Although these criteria are a major research issue in software testing, little work has been specifically targeted towards the testing of database-driven applications. In this paper, two structural coverage criteria are provided for evaluating the adequacy of a test suite for...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Modelling Mailing List Behaviour in Open Source Projects: the Case of ARM Embedded Linux

    One of the benefits firms can derive from using Open Source Software (OSS) is informal development collaboration, and the primary tool for collaboration and coordination are group mailing lists. The purpose of the paper is modelling mailing lists behaviour in OSS projects, using a set of descriptors that could inform...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Web 2.0 Adoption by Danish Newspapers - Urgent Need for New Business Models?

    This paper presents findings from the development process of a general innovation framework for an ongoing Nordic R&D project on e-business and media. It focuses on the current state of the Danish news media sector and the conclusions the authors can draw from the "Web 2.0 activity" of the Danish...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Multilayer Ensemble Pruning Via Novel Multi-Sub-Swarm Particle Swarm Optimization

    Recently, classifier ensemble methods are gaining more and more attention in the machine-learning and data-mining communities. In most cases, the performance of an ensemble is better than a single classifier. Many methods for creating diverse classifiers were developed during the past decade. When these diverse classifiers are generated, it is...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    A Personalized URL Re-Ranking Method Using Psychological User Browsing Characteristics

    This paper proposes a personalized URL re-ranking method based on psychological characteristics of users browsing. The characteristics are classified into three groups, which are "Common-mind," "Uncommon-mind," and "Extremely uncommon-mind." The authors' personalization method constructs an index of the anchor text retrieved from the web pages that the user has clicked...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2009

    USF-PAS: Study on Core Security Technologies for Ubiquitous Security Framework

    Ubi-Com has emerged as an exciting new paradigm to provide intelligent computing and communications at anytime and anywhere. But, In order to take the advantages of such services, it is important that intelligent security framework be suitable for Ubi-Com. In this paper, the authors propose privacy and access control scheme...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2009

    Vascular Pattern Analysis Towards Pervasive Palm Vein Authentication

    In this paper, the authors propose an Image Analysis technique for Vascular Pattern of Hand Palm, which in turn leads towards Palm Vein Authentication of an individual. Near-Infrared Image of Palm Vein pattern is taken and passed through three different processes or algorithms to process the Infrared Image in such...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2009

    Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network

    Operations of mobile ad hoc networks rely on the collaboration of participating nodes to route data for each other. This standard approach using a fixed set of nodes for each communication link cannot cope with high mobility due to a high frequency of link breaks. A recent approach based on...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2009

    A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security

    Pervasive smart computing environments make people get accustomed to convenient and secure services. The overall goal of this research is to classify vehicles along the I215 freeway in Salt Lake City, USA. This information will be used to predict future roadway needs and the expected life of a roadway. The...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2009

    Development of a Web Application for Management of Learning Styles

    Information and Communication Technologies (ICT) permit the innovation of teaching and learning processes. ICT allow teachers to create or select and adjust contents that take advantage of the digital environment and interaction between peers. Teaching methodologies and strategies should be adjusted to the learning styles of students, offering them, in...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2009

    Designing Secure Data Warehouses by Using MDA and QVT

    The Data Warehouse (DW) design is based on MultiDimensional (MD) modeling which structures information into facts and dimensions. Due to the confidentiality of the data that it stores, it is crucial to specify security and audit measures from the early stages of design and to enforce them throughout the life-cycle....

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme

    Node churn is a hindrance to construction of P2P-based anonymous networks, which makes anonymous paths fragile and results in message losses and communication failures. A collaboration scheme combining Friendly Neighbor-based Incentive (FNI) and Re-encryption mechanism is proposed to deal with the high node churn characteristic of P2P networks. The FNI...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    MC-Supporter: Flexible Mobile Computing Supporting Learning Though Social Interactions

    Nowadays, the authors are experiencing a rapid development in mobile computing because of the sinking prices of the mobile devices and the availability of wireless networks that can connect them. The ability of many of these devices to set up ad-hoc networks by proximity allows face-to-face interaction combined with mobility....

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    A QoS Perspective on Exception Diagnosis in Service- Oriented Computing

    Unlike object-oriented applications it is difficult to address exceptions in multi-agent systems due to their highly dynamic and autonomous nature. The authors' previous work has examined exception diagnosis in multi-agent systems based on a heuristic classification method. In this paper, they extend their work by applying an exception diagnosis method...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    Supporting Awareness in Groupware Through an Aspect- Oriented Middleware Service

    Solutions have been proposed to support awareness in groupware. Frequently, this requirement is fulfilled by similar functionalities that are implemented in different modules within these collaborative applications. These solutions usually represent crosscut concerns related to awareness by the use of object-oriented programming. As a result, tightly coupled components are generated...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    Pattern-Oriented Workflow Generation and Optimization

    Automatic workflow generation is becoming an active research area for dealing with the dynamics of grid infrastructure, because it has a pervasive impact on system usability, flexibility and robustness. Artificial intelligence technology and explicit knowledge have been exploited in some research for workflow construction or composition. With the increasing use...

    Provided By Journal of Universal Computer Science

  • White Papers // Dec 2010

    Linking UML and MDD Through UML Profiles: A Practical Approach Based on the UML Association

    In a model-driven development context, the definition (or selection) of an appropriate modeling language is a crucial task. OMG, in the model-driven architecture specification, recommends the use of UML for model-driven developments. However, the lack of semantic precision in UML has led to different model-driven approaches proposing their own domain-specific...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2010

    Systematic Management of Variability in UML-Based Software Product Lines

    This paper presents SMarty, a variability management approach for UMLbased software Product Lines (PL). SMarty is supported by a UML profile, the SMartyProfile, and a process for managing variabilities, the SMartyProcess. SMartyProfile aims at representing variabilities, variation points, and variants in UML models by applying a set of stereotypes. SMartyProcess...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2010

    UML Behavior Models of Real-Time Embedded Software for Model-Driven Architecture

    Model-Driven Architecture (MDA) presents a set of layered models to separate design concerns from platform concerns. The model executability for each model element is still challenging although MDA is currently able to cope with most syntactic and transformation definition issues. Moreover, the importance of rigorous specification and verification of the...

    Provided By Journal of Universal Computer Science