Journal of Universal Computer Science

Displaying 1-40 of 171 results

  • White Papers // Mar 2011

    Modeling Quality Attributes With Aspect-Oriented Architectural Templates

    The quality attributes of a software system are, to a large extent, determined by the decisions taken early in the development process. Best practices in software engineering recommend the identification of important quality attributes during the requirements elicitation process, and the specification of software architectures to satisfy these requirements. Over...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2011

    QoS-Based Approach for Dynamic Web Service Composition

    Web Services have become a standard for integration of systems in distributed environments. By using a set of open interoperability standards, they allow computer-computer interaction, regardless the programming languages and operating systems used. The Semantic Web Services, by its turn, make use of ontologies to describe their functionality in a...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    An Aspect-Oriented Framework for Weaving Domain-Specific Concerns Into Component-Based Systems

    Software components are used in various application domains, and many component models and frameworks have been proposed to fulfill domain-specific requirements. The general trend followed by these approaches is to provide ad-hoc models and tools for capturing these requirements and for implementing their support within dedicated run-time platforms, limited to...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    Nondeterministic Query Algorithms

    Query algorithms are used to compute Boolean functions. The definition of the function is known, but input is hidden in a black box. The aim is to compute the function value using as few queries to the black box as possible. As in other computational models, different kinds of query...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS

    Recently, IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX for short) has provided one with low-cost, high efficiency and high bandwidth network services. However, as with the WiFi, the radio wave transmission also makes the WiMAX face the wireless transmission security problem. To solve this problem, the IEEE802.16Std during its...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    Service Oriented Multimedia Delivery System in Pervasive Environments

    Service composition is an effective approach for large-scale multimedia delivery. In previous works, user requirement is represented as one fixed functional path which is composed of several functional components in a certain order. Actually, there may be several functional paths (deliver different quality level multimedia data, e.g., image pixel, frame...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2011

    ORPMS: An Ontology-Based Real-Time Project Monitoring System in the Cloud

    Project monitoring plays a crucial role in project management, which is a part of every stage of a project's life-cycle. Nevertheless, along with the increasing ratio of outsourcing in many companies' strategic plans, project monitoring has been challenged by geographically dispersed project teams and culturally diverse team members. Furthermore, because...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2011

    An Ontology Based Agent Generation for Information Retrieval on Cloud Environment

    Retrieving information or discovering knowledge from a well-organized data center in general is requested to be familiar with its schema, structure, and architecture, which against the inherent concept and characteristics of cloud environment. An effective approach to retrieve desired information or to extract useful knowledge is an important issue in...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2011

    Cloud Warehousing

    Data warehouses integrate and aggregate data from various sources to support decision making within an enterprise. Usually, it is assumed that data are extracted from operational databases used by the enterprise. Cloud warehousing relaxes this view permitting data sources to be located anywhere on the world-wide web in a so-called...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2011

    Cooperation as a Service in VANETs

    Vehicular Networks, including Vehicular Ad-hoc NETworks (VANETs) and Vehicular Sensor Networks (VSNs), stimulate a brand new variety of services, ranging from driver safety services, traffic information and warnings regarding traffic jams and accidents, to providing weather or road condition, parking availability, and advertisement. 3G networks and sophisticated Intelligent Transportation Systems...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2011

    Application of Systems Modeling Language (SySML) for Cognitive Work Analysis in Systems Engineering Design Process

    At present time most system engineers do not have access to cognitive work analysis knowledge or training in terms that they could understand and apply in the system design process. This may lead to specifying systems requirements that do not account for cognitive strengths and limitations of the prospective users....

    Provided By Journal of Universal Computer Science

  • White Papers // May 2011

    Usability Evaluation of a Visual Modelling Tool for OWL Ontologies

    Usability is generally regarded as ensuring that software products are effective and efficient to use from the user's perspective. Diverse aspects that ensure the usability of a software product should be assessed during the different phases in its life cycle. The goal of usability testing is to evaluate whether or...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2011

    Using the Affect Grid to Measure Emotions in Software Requirements Engineering

    Computer systems are designed and used by humans. And human being is characterized, among other things, by emotions. Giving this fact, the process of designing and developing computer systems is, like any other facet in the people lives, driven by emotions. Requirements engineering is one of the main phases in...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2011

    Multimedia Modules and Virtual Organization Website for Collaborative Research Experience for Teachers in STEM

    Wireless enabled cyber physical systems and applications, highly interactive multimedia modules, and virtual organization tools and capabilities provide attractive avenues for boosting interest and improving teaching effectiveness of STEM courses in schools. In this paper, the authors describe the Research Experience for Teachers (RET) - Hawaii program and present features...

    Provided By Journal of Universal Computer Science

  • White Papers // Jul 2011

    Performance Evaluation of Snort Under Windows 7 and Windows Server 2008

    Snort is the most widely deployed Network Intrusion Detection System (NIDS) worldwide, with millions of downloads to date. PC-based Snort typically runs on either Linux or Windows operating systems. In this paper, the authors present an experimental evaluation and comparison of the performance of Snort NIDS when running under the...

    Provided By Journal of Universal Computer Science

  • White Papers // Jul 2011

    RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks

    In-network data aggregation has a great impact on the energy consumption in large-scale wireless sensor networks. However, the resource constraints and vulnerable deployment environments challenge the application of this technique in terms of security and efficiency. A compromised node may forge arbitrary aggregation value and mislead the base station into...

    Provided By Journal of Universal Computer Science

  • White Papers // Aug 2011

    Recommending Open Linked Data in Creativity Sessions Using Web Portals With Collaborative Real Time Environment

    In this paper, the authors describe a concept of the recommender system for collaborative real time web based editing in the context of creativity sessions. The collaborative real time editing provides creativity teams of which members are physically distributed with an emulation of the synchronous collaboration where presence of the...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2011

    Software Process Definition: A Reuse-Based Approach

    Software product development has been taking advantage of reuse techniques for some decades. Concepts like software components, architectures, and product lines have been successfully applied in several contexts to develop software products, although some difficulties are still faced. Software processes have strong similarities with software products, and some researchers argue...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2011

    Achieving Transparent & Real-Time Collaboration in Co- AutoCAD Application

    In order to support the real-time collaboration between geographically distributed designers, the single-user application AutoCAD is required to be transformed transparently into groupware system by adopting fully replicated architecture. As the core issue to maintain the consistency of the distributed replicas, traditional consistency maintenance algorithms (such as Operation Transformation and...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2011

    Web Services Discovery in a Pay-As-You-Go Fashion

    Extensive effort has been brought forth to assist in web service discovery. In particular, classic Information Retrieval techniques are exploited to assess the similarity between two web services descriptions, while Semantic Web technologies are proposed to enhance semantic service descriptions. These approaches have greatly improved the quality and accuracy of...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2011

    Optimization of Gateway Deployment With Load Balancing and Interference Minimization in Wireless Mesh Networks

    In a Wireless Mesh Network (WMN), gateways act as the bridges between the mesh backbone and the Internet, and significantly affect the performance of the whole network. Hence, how to determine the optimal number and positions of gateways, i.e., gateway deployment, is one of the most important and challenging topics...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2009

    On Defining the Behavior of OR-Joins in Business Process Models

    A common approach in designing relational databases is to start with a universal relation schema, which is then decomposed into multiple subschemas. A good choice of subschemas can be determined using integrity constraints defined on the schema, such as functional, multivalued or join dependencies. In this paper, the authors propose...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    Dynamic Data Warehouse Design With Abstract State Machines

    On-Line Analytical Processing (OLAP) systems deal with analytical tasks that support decision making. As these tasks do not depend on the latest updates by transactions, it is assumed that the data required by OLAP systems are kept in a data warehouse, which separates the input from operational databases from the...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    On the Design of Secure Multimedia Authentication

    At present, the proposed authentication schemes can be classified into three categories. The first category is the watermarking authentication schemes in which the watermark is independent of the multimedia content. The second category is the signature-based authentication schemes in which the signature is generated by the multimedia content and is...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2009

    Stability in Heterogeneous Multimedia Networks Under Adversarial Attacks

    A distinguishing feature of today's large-scale platforms for multimedia distribution and communication, such as the Internet, is their heterogeneity, predominantly manifested by the fact that a variety of communication protocols are simultaneously running over different hosts. A fundamental question that naturally arises for such common settings of heterogeneous multimedia systems...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2009

    The Topology Change Attack: Threat and Impact

    Peer-To-Peer (P2P) network has received in past few years a significant attention, especially such file sharing network as eDonkey or BitTorrent. The shift from the classical client-server based paradigm of the Internet, with a clear distinction between information providers and consumers, towards consumers sharing information among each other led to...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2009

    A New Detection Method for Distributed Denial-of-Service Attack Traffic Based on Statistical Test

    This paper has proposed a new detection method for DDoS attack traffic based on two-sample t-test. The authors first investigate the statistics of normal SYN Arrival Rate (SAR) and confirm it follows normal distribution. The proposed method identifies the attack by testing the difference between incoming SAR and normal SAR,...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Advances in Homomorphic Cryptosystems

    During the last few years homomorphic encryption techniques have been studied extensively since they have become more and more important in many different cryptographic protocols such as voting protocols, lottery protocols, anonymity, privacy, and electronic auctions. This paper critically summarizes the current state-of-art of homomorphic cryptosystems. It recalls the basic...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Structural Coverage Criteria for Testing SQL Queries

    Adequacy criteria provide an objective measurement of test quality. Although these criteria are a major research issue in software testing, little work has been specifically targeted towards the testing of database-driven applications. In this paper, two structural coverage criteria are provided for evaluating the adequacy of a test suite for...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Modelling Mailing List Behaviour in Open Source Projects: the Case of ARM Embedded Linux

    One of the benefits firms can derive from using Open Source Software (OSS) is informal development collaboration, and the primary tool for collaboration and coordination are group mailing lists. The purpose of the paper is modelling mailing lists behaviour in OSS projects, using a set of descriptors that could inform...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Web 2.0 Adoption by Danish Newspapers - Urgent Need for New Business Models?

    This paper presents findings from the development process of a general innovation framework for an ongoing Nordic R&D project on e-business and media. It focuses on the current state of the Danish news media sector and the conclusions the authors can draw from the "Web 2.0 activity" of the Danish...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Multilayer Ensemble Pruning Via Novel Multi-Sub-Swarm Particle Swarm Optimization

    Recently, classifier ensemble methods are gaining more and more attention in the machine-learning and data-mining communities. In most cases, the performance of an ensemble is better than a single classifier. Many methods for creating diverse classifiers were developed during the past decade. When these diverse classifiers are generated, it is...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    A Personalized URL Re-Ranking Method Using Psychological User Browsing Characteristics

    This paper proposes a personalized URL re-ranking method based on psychological characteristics of users browsing. The characteristics are classified into three groups, which are "Common-mind," "Uncommon-mind," and "Extremely uncommon-mind." The authors' personalization method constructs an index of the anchor text retrieved from the web pages that the user has clicked...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2009

    USF-PAS: Study on Core Security Technologies for Ubiquitous Security Framework

    Ubi-Com has emerged as an exciting new paradigm to provide intelligent computing and communications at anytime and anywhere. But, In order to take the advantages of such services, it is important that intelligent security framework be suitable for Ubi-Com. In this paper, the authors propose privacy and access control scheme...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2009

    Vascular Pattern Analysis Towards Pervasive Palm Vein Authentication

    In this paper, the authors propose an Image Analysis technique for Vascular Pattern of Hand Palm, which in turn leads towards Palm Vein Authentication of an individual. Near-Infrared Image of Palm Vein pattern is taken and passed through three different processes or algorithms to process the Infrared Image in such...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2009

    Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network

    Operations of mobile ad hoc networks rely on the collaboration of participating nodes to route data for each other. This standard approach using a fixed set of nodes for each communication link cannot cope with high mobility due to a high frequency of link breaks. A recent approach based on...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2009

    A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security

    Pervasive smart computing environments make people get accustomed to convenient and secure services. The overall goal of this research is to classify vehicles along the I215 freeway in Salt Lake City, USA. This information will be used to predict future roadway needs and the expected life of a roadway. The...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2009

    Development of a Web Application for Management of Learning Styles

    Information and Communication Technologies (ICT) permit the innovation of teaching and learning processes. ICT allow teachers to create or select and adjust contents that take advantage of the digital environment and interaction between peers. Teaching methodologies and strategies should be adjusted to the learning styles of students, offering them, in...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2009

    Designing Secure Data Warehouses by Using MDA and QVT

    The Data Warehouse (DW) design is based on MultiDimensional (MD) modeling which structures information into facts and dimensions. Due to the confidentiality of the data that it stores, it is crucial to specify security and audit measures from the early stages of design and to enforce them throughout the life-cycle....

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme

    Node churn is a hindrance to construction of P2P-based anonymous networks, which makes anonymous paths fragile and results in message losses and communication failures. A collaboration scheme combining Friendly Neighbor-based Incentive (FNI) and Re-encryption mechanism is proposed to deal with the high node churn characteristic of P2P networks. The FNI...

    Provided By Journal of Universal Computer Science