Journal of Universal Computer Science

Displaying 1-40 of 154 results

  • White Papers // Sep 2013

    Developing a Web-Based Question-Driven Audience Response System Supporting BYOD

    Question-driven Audience Response Systems (ARSs) are in the focus of research since the 1960s. Since then, the technology has changed and therefore systems have evolved too. This paper is about conception and implementation of the web-based ARS real feedback which uses the principle of Bring Your Own Device (BYOD). A...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2014

    Towards Formal Linear Cryptanalysis Using HOL4

    Linear Cryptanalysis (LC), first introduced by the researcher, is one of the most widely used techniques for judging the security of symmetric-key cryptosystems. Traditionally, LC is performed using computer programs that are based on some fundamental probabilistic algorithms and lemmas, which have been validated using paper-and-pencil proof methods. In order...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2014

    Classification of VANET MAC, Routing and Approaches A Detailed Survey

    Human safety considerations linked with rapidly growing auto mobile market has given special attention to the Intelligent Transportation System (ITS). ITS provides a set of standards for inter vehicular communication with emphasis on safety, traffic efficiency and infotainment related applications. In ITS, the vehicles acting as mobile nodes, form a...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2010

    Position-Based Routing Protocol for Low Power Wireless Sensor Networks

    This paper presents a table-less position based routing scheme for low power data centric wireless sensor networks. The proposed scheme is localized, uses greedy forwarding approach, and does not rely on neighborhood information. These characteristics reduce the communication overhead (no neighborhood information exchange), make the protocol highly scalable (no routing...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2008

    Integrating Service-Oriented Mobile Units to Support Collaboration in Ad-Hoc Scenarios

    Advances in wireless communication and mobile computing extend collaboration scenarios. Mobile workers using computing devices are currently able to collaborate in order to carry out productive, educational or social activities. Typically, collaborative applications intended to support mobile workers involve some type of centralized data or services, because they are designed...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    Application Framework With Demand-Driven Mashup for Selective Browsing

    The authors are developing a new mashup framework for creating flexible applications in which users can selectively browse through mashup items. The framework provides GUI components called widgets through which users can browse mashed-up data selectively, and the system processes demand-driven creation of mashed-up data upon receiving access requests through...

    Provided By Journal of Universal Computer Science

  • White Papers // Jun 2009

    An Approach for Estimating Execution Time Probability Distributions of Component-Based Real-Time Systems

    In recent years, many component-based real-time systems have been proposed as a solution to modular and easily maintainable distributed real-time systems. This paper proposes a methodology for estimating probability distributions of execution times in the context of such systems, where no access to component internal code is assumed. In order...

    Provided By Journal of Universal Computer Science

  • White Papers // Jun 2009

    Mining Dynamic Databases Using Probability-Based Incremental Association Rule Discovery Algorithm

    In dynamic databases, new transactions are appended as time advances. This paper is concerned with applying an incremental association rule mining to extract interesting information from a dynamic database. An incremental association rule discovery can create an intelligent environment such that new information or knowledge such as changing customer preferences...

    Provided By Journal of Universal Computer Science

  • White Papers // Jul 2009

    A Load Balancing and Congestion-Avoidance Routing Mechanism for Teal-Time Traffic Over Vehicular Networks

    With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Resource management for real-time traffic has widely been recognized as one of the most challenging problems for seamless access to vehicular networks. In...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    SeAAS - A Reference Architecture for Security Services in SOA

    Decentralized security models and distributed infrastructures of scenarios based on Service Oriented Architectures make the enforcement of security policies a key challenge - all the more so for business processes spanning over multiple enterprises. The current practice to implement security functionality exclusively at the endpoint places a significant processing burden...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    Information Theoretically Secure Encryption With Almost Free Authentication

    In cryptology, secure channels enable the exchange of messages in a confidential and authenticated manner. The literature of cryptology is rich with proposals and analysis that address the secure communication over public (insecure) channels. In this paper, the authors propose information theoretically secure direction for the construction of secure channels....

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    ModelSec: A Generative Architecture for Model-Driven Security

    Increasingly, the success of software systems depends largely on how their security requirements are satisfied. However, developers are challenged in implementing these requirements, mainly because of the gap between the specification and implementation, and the technical complexities of the current software infrastructures. Recently, Model-Driven Security has emerged as a new...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    A System for Managing Security Knowledge Using Case Based Reasoning and Misuse Cases

    Making secure a software system is a very critical purpose, especially because it is very hard to consolidate an exhaustive body of knowledge about security risks and related countermeasures. To define a technological infrastructure for exploiting this knowledge poses many challenges. This paper introduces a system to capture, share and...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2009

    Understanding Tools and Practices for Distributed Pair Programming

    When considering the principles for eXtreme Programming, distributed eXtreme Programming, especially distributed pair programming, is a paradox predetermined to failure. However, global software development as well as the outsourcing of software development are integral parts of software projects. Hence, the support for distributed pair programming is still a challenging field...

    Provided By Journal of Universal Computer Science

  • White Papers // Dec 2010

    Watermarking Techniques for Relational Databases: Survey, Classification and Comparison

    Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of relational data. Many watermarking techniques have been proposed in the literature to address these purposes. In this paper, the authors survey the current state-of-the-art and they classify them according...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2009

    LCP-Nets: A Linguistic Approach for Non-Functional Preferences in a Semantic SOA Environment

    This paper addresses the problem of expressing preferences among nonfunctional properties of services in a Web service architecture. In such a context, semantic and non-functional annotations are required on service declarations and business process calls to services in order to select the best available service for each invocation. To cope...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2010

    A Model for Capturing and Managing Software Engineering Knowledge and Experience

    During software development projects there is always a particular working "Product" that is generated but rarely managed: the knowledge and experience that team members acquire. This knowledge and experience, if conveniently managed, can be reused in future software projects and be the basis for process improvement initiatives. In this paper,...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2010

    Performance Optimizations for DAA Signatures on Java Enabled Platforms

    With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the computational requirements of public-key cryptosystems are often beyond the constraints embedded processors are bound to. This is especially true for cryptosystems that make heavy use of...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2010

    Towards a Virtual Trusted Platform

    The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisation platform for security sensitive software modules. The amalgam of these technologies allows an attractive off-the-shelf environment, capable of supporting security levels potentially higher than commonly deployed...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2010

    Impact of CPU-Bound Processes on IP Forwarding of Linux and Windows XP

    These days, Commodity-Off-The-Shelf (COTS) hardware and software are used to build high-end and powerful workstations and servers to be deployed in today's local area networks of private homes and small-to medium-sized business. Typically, these servers are multipurpose and shared - running networking functionalities involving IP packet forwarding in addition to...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2009

    Designing Secure Data Warehouses by Using MDA and QVT

    The Data Warehouse (DW) design is based on MultiDimensional (MD) modeling which structures information into facts and dimensions. Due to the confidentiality of the data that it stores, it is crucial to specify security and audit measures from the early stages of design and to enforce them throughout the life-cycle....

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme

    Node churn is a hindrance to construction of P2P-based anonymous networks, which makes anonymous paths fragile and results in message losses and communication failures. A collaboration scheme combining Friendly Neighbor-based Incentive (FNI) and Re-encryption mechanism is proposed to deal with the high node churn characteristic of P2P networks. The FNI...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    MC-Supporter: Flexible Mobile Computing Supporting Learning Though Social Interactions

    Nowadays, the authors are experiencing a rapid development in mobile computing because of the sinking prices of the mobile devices and the availability of wireless networks that can connect them. The ability of many of these devices to set up ad-hoc networks by proximity allows face-to-face interaction combined with mobility....

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    A QoS Perspective on Exception Diagnosis in Service- Oriented Computing

    Unlike object-oriented applications it is difficult to address exceptions in multi-agent systems due to their highly dynamic and autonomous nature. The authors' previous work has examined exception diagnosis in multi-agent systems based on a heuristic classification method. In this paper, they extend their work by applying an exception diagnosis method...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    Supporting Awareness in Groupware Through an Aspect- Oriented Middleware Service

    Solutions have been proposed to support awareness in groupware. Frequently, this requirement is fulfilled by similar functionalities that are implemented in different modules within these collaborative applications. These solutions usually represent crosscut concerns related to awareness by the use of object-oriented programming. As a result, tightly coupled components are generated...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    Pattern-Oriented Workflow Generation and Optimization

    Automatic workflow generation is becoming an active research area for dealing with the dynamics of grid infrastructure, because it has a pervasive impact on system usability, flexibility and robustness. Artificial intelligence technology and explicit knowledge have been exploited in some research for workflow construction or composition. With the increasing use...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    Integrating Semantic Web and Object-Oriented Programming for Cooperative Design

    Object-Oriented Programming (OOP) is a mainstream paradigm for engineering design software tool development. An emerging requirement is the introduction of semantics to achieve heterogeneous information sharing, but many challenges exist. Examples include using object methods to manipulate an RDF data, automatically converting data into RDF format, and supporting various programming...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    Transmission Latency Based Network Friendly Tree for Peer-To-Peer Streaming

    In Peer-To-Peer(P2P) streaming system, the multicasting tree construction method influences considerably on network load. Under current available strategies, network resources are not used economically, or network resource friendship and the flexibility can't be approached thoroughly. With the increasing application of Internet, network infrastructure itself becomes a precious resource, which should...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    Updates, Schema Updates and Validation of XML Documents - Using Abstract State Machines With Automata-Defined States

    The exact validation of streaming XML documents can be realised by using Visibly Push-down Automata (VPA) that are defined by Extended Document Type Definitions (EDTD). It is straightforward to represent such an automaton as an Abstract State Machine (ASM). In doing so, the authors enable computations on abstract states that...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    SQL/XML Hierarchical Query Performance Analysis in an XML-Enabled Database System

    The increase utilization of XML structure for data representation, exchange, and integration has strengthened the need for an efficient storage and retrieval of XML data. Currently, there are two major streams of XML data repositories. The first stream is the Native XML database systems which are built solely to store...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    An Agent for Web-Based Structured Hypermedia Algorithm Explanation System

    Studying and understanding algorithms is important for all computer scientists. Over two decades of research has been devoted to improving algorithm visualization and algorithm explanation techniques. Knowledge gained from these practices allows them to design and implement logically correct programs with considerations to run-time and memory constraints. For many students,...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2011

    On the Construction of Efficiently Navigable Tag Clouds Using Knowledge From Structured Web Content

    In this paper, the authors present an approach to improving navigability of a hierarchically structured Web content. The approach is based on an integration of a tagging module and adoption of tag clouds as a navigational aid for such content. The main idea of this approach is to apply tagging...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    Modeling Quality Attributes With Aspect-Oriented Architectural Templates

    The quality attributes of a software system are, to a large extent, determined by the decisions taken early in the development process. Best practices in software engineering recommend the identification of important quality attributes during the requirements elicitation process, and the specification of software architectures to satisfy these requirements. Over...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2011

    QoS-Based Approach for Dynamic Web Service Composition

    Web Services have become a standard for integration of systems in distributed environments. By using a set of open interoperability standards, they allow computer-computer interaction, regardless the programming languages and operating systems used. The Semantic Web Services, by its turn, make use of ontologies to describe their functionality in a...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    An Aspect-Oriented Framework for Weaving Domain-Specific Concerns Into Component-Based Systems

    Software components are used in various application domains, and many component models and frameworks have been proposed to fulfill domain-specific requirements. The general trend followed by these approaches is to provide ad-hoc models and tools for capturing these requirements and for implementing their support within dedicated run-time platforms, limited to...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    Nondeterministic Query Algorithms

    Query algorithms are used to compute Boolean functions. The definition of the function is known, but input is hidden in a black box. The aim is to compute the function value using as few queries to the black box as possible. As in other computational models, different kinds of query...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS

    Recently, IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX for short) has provided one with low-cost, high efficiency and high bandwidth network services. However, as with the WiFi, the radio wave transmission also makes the WiMAX face the wireless transmission security problem. To solve this problem, the IEEE802.16Std during its...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    Service Oriented Multimedia Delivery System in Pervasive Environments

    Service composition is an effective approach for large-scale multimedia delivery. In previous works, user requirement is represented as one fixed functional path which is composed of several functional components in a certain order. Actually, there may be several functional paths (deliver different quality level multimedia data, e.g., image pixel, frame...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2011

    ORPMS: An Ontology-Based Real-Time Project Monitoring System in the Cloud

    Project monitoring plays a crucial role in project management, which is a part of every stage of a project's life-cycle. Nevertheless, along with the increasing ratio of outsourcing in many companies' strategic plans, project monitoring has been challenged by geographically dispersed project teams and culturally diverse team members. Furthermore, because...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2011

    An Ontology Based Agent Generation for Information Retrieval on Cloud Environment

    Retrieving information or discovering knowledge from a well-organized data center in general is requested to be familiar with its schema, structure, and architecture, which against the inherent concept and characteristics of cloud environment. An effective approach to retrieve desired information or to extract useful knowledge is an important issue in...

    Provided By Journal of Universal Computer Science