Journal of Universal Computer Science

Displaying 1-40 of 91 results

  • White Papers // Oct 2011

    Web Services Discovery in a Pay-As-You-Go Fashion

    Extensive effort has been brought forth to assist in web service discovery. In particular, classic Information Retrieval techniques are exploited to assess the similarity between two web services descriptions, while Semantic Web technologies are proposed to enhance semantic service descriptions. These approaches have greatly improved the quality and accuracy of...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2011

    Optimization of Gateway Deployment With Load Balancing and Interference Minimization in Wireless Mesh Networks

    In a Wireless Mesh Network (WMN), gateways act as the bridges between the mesh backbone and the Internet, and significantly affect the performance of the whole network. Hence, how to determine the optimal number and positions of gateways, i.e., gateway deployment, is one of the most important and challenging topics...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2011

    Achieving Transparent & Real-Time Collaboration in Co- AutoCAD Application

    In order to support the real-time collaboration between geographically distributed designers, the single-user application AutoCAD is required to be transformed transparently into groupware system by adopting fully replicated architecture. As the core issue to maintain the consistency of the distributed replicas, traditional consistency maintenance algorithms (such as Operation Transformation and...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2011

    Software Process Definition: A Reuse-Based Approach

    Software product development has been taking advantage of reuse techniques for some decades. Concepts like software components, architectures, and product lines have been successfully applied in several contexts to develop software products, although some difficulties are still faced. Software processes have strong similarities with software products, and some researchers argue...

    Provided By Journal of Universal Computer Science

  • White Papers // Aug 2011

    Recommending Open Linked Data in Creativity Sessions Using Web Portals With Collaborative Real Time Environment

    In this paper, the authors describe a concept of the recommender system for collaborative real time web based editing in the context of creativity sessions. The collaborative real time editing provides creativity teams of which members are physically distributed with an emulation of the synchronous collaboration where presence of the...

    Provided By Journal of Universal Computer Science

  • White Papers // Jul 2011

    Performance Evaluation of Snort Under Windows 7 and Windows Server 2008

    Snort is the most widely deployed Network Intrusion Detection System (NIDS) worldwide, with millions of downloads to date. PC-based Snort typically runs on either Linux or Windows operating systems. In this paper, the authors present an experimental evaluation and comparison of the performance of Snort NIDS when running under the...

    Provided By Journal of Universal Computer Science

  • White Papers // Jul 2011

    RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks

    In-network data aggregation has a great impact on the energy consumption in large-scale wireless sensor networks. However, the resource constraints and vulnerable deployment environments challenge the application of this technique in terms of security and efficiency. A compromised node may forge arbitrary aggregation value and mislead the base station into...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2011

    Usability Evaluation of a Visual Modelling Tool for OWL Ontologies

    Usability is generally regarded as ensuring that software products are effective and efficient to use from the user's perspective. Diverse aspects that ensure the usability of a software product should be assessed during the different phases in its life cycle. The goal of usability testing is to evaluate whether or...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2011

    Using the Affect Grid to Measure Emotions in Software Requirements Engineering

    Computer systems are designed and used by humans. And human being is characterized, among other things, by emotions. Giving this fact, the process of designing and developing computer systems is, like any other facet in the people lives, driven by emotions. Requirements engineering is one of the main phases in...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2011

    Multimedia Modules and Virtual Organization Website for Collaborative Research Experience for Teachers in STEM

    Wireless enabled cyber physical systems and applications, highly interactive multimedia modules, and virtual organization tools and capabilities provide attractive avenues for boosting interest and improving teaching effectiveness of STEM courses in schools. In this paper, the authors describe the Research Experience for Teachers (RET) - Hawaii program and present features...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2011

    ORPMS: An Ontology-Based Real-Time Project Monitoring System in the Cloud

    Project monitoring plays a crucial role in project management, which is a part of every stage of a project's life-cycle. Nevertheless, along with the increasing ratio of outsourcing in many companies' strategic plans, project monitoring has been challenged by geographically dispersed project teams and culturally diverse team members. Furthermore, because...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2011

    An Ontology Based Agent Generation for Information Retrieval on Cloud Environment

    Retrieving information or discovering knowledge from a well-organized data center in general is requested to be familiar with its schema, structure, and architecture, which against the inherent concept and characteristics of cloud environment. An effective approach to retrieve desired information or to extract useful knowledge is an important issue in...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2011

    Cloud Warehousing

    Data warehouses integrate and aggregate data from various sources to support decision making within an enterprise. Usually, it is assumed that data are extracted from operational databases used by the enterprise. Cloud warehousing relaxes this view permitting data sources to be located anywhere on the world-wide web in a so-called...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2011

    Application of Systems Modeling Language (SySML) for Cognitive Work Analysis in Systems Engineering Design Process

    At present time most system engineers do not have access to cognitive work analysis knowledge or training in terms that they could understand and apply in the system design process. This may lead to specifying systems requirements that do not account for cognitive strengths and limitations of the prospective users....

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    Nondeterministic Query Algorithms

    Query algorithms are used to compute Boolean functions. The definition of the function is known, but input is hidden in a black box. The aim is to compute the function value using as few queries to the black box as possible. As in other computational models, different kinds of query...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS

    Recently, IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX for short) has provided one with low-cost, high efficiency and high bandwidth network services. However, as with the WiFi, the radio wave transmission also makes the WiMAX face the wireless transmission security problem. To solve this problem, the IEEE802.16Std during its...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    Service Oriented Multimedia Delivery System in Pervasive Environments

    Service composition is an effective approach for large-scale multimedia delivery. In previous works, user requirement is represented as one fixed functional path which is composed of several functional components in a certain order. Actually, there may be several functional paths (deliver different quality level multimedia data, e.g., image pixel, frame...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    Modeling Quality Attributes With Aspect-Oriented Architectural Templates

    The quality attributes of a software system are, to a large extent, determined by the decisions taken early in the development process. Best practices in software engineering recommend the identification of important quality attributes during the requirements elicitation process, and the specification of software architectures to satisfy these requirements. Over...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    An Aspect-Oriented Framework for Weaving Domain-Specific Concerns Into Component-Based Systems

    Software components are used in various application domains, and many component models and frameworks have been proposed to fulfill domain-specific requirements. The general trend followed by these approaches is to provide ad-hoc models and tools for capturing these requirements and for implementing their support within dedicated run-time platforms, limited to...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2011

    On the Construction of Efficiently Navigable Tag Clouds Using Knowledge From Structured Web Content

    In this paper, the authors present an approach to improving navigability of a hierarchically structured Web content. The approach is based on an integration of a tagging module and adoption of tag clouds as a navigational aid for such content. The main idea of this approach is to apply tagging...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2011

    QoS-Based Approach for Dynamic Web Service Composition

    Web Services have become a standard for integration of systems in distributed environments. By using a set of open interoperability standards, they allow computer-computer interaction, regardless the programming languages and operating systems used. The Semantic Web Services, by its turn, make use of ontologies to describe their functionality in a...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2011

    Cooperation as a Service in VANETs

    Vehicular Networks, including Vehicular Ad-hoc NETworks (VANETs) and Vehicular Sensor Networks (VSNs), stimulate a brand new variety of services, ranging from driver safety services, traffic information and warnings regarding traffic jams and accidents, to providing weather or road condition, parking availability, and advertisement. 3G networks and sophisticated Intelligent Transportation Systems...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2011

    Visualizing and Analyzing the Quality of XML Documents

    In this paper, the authors introduce eXVisXML, a visual tool to explore documents annotated with the mark-up language XML, in order to easily perform over them tasks as knowledge extraction or document engineering. eXVisXML was designed mainly for two kind of users. Those who want to analyze an annotated document...

    Provided By Journal of Universal Computer Science

  • White Papers // Dec 2010

    Linking UML and MDD Through UML Profiles: A Practical Approach Based on the UML Association

    In a model-driven development context, the definition (or selection) of an appropriate modeling language is a crucial task. OMG, in the model-driven architecture specification, recommends the use of UML for model-driven developments. However, the lack of semantic precision in UML has led to different model-driven approaches proposing their own domain-specific...

    Provided By Journal of Universal Computer Science

  • White Papers // Dec 2010

    Watermarking Techniques for Relational Databases: Survey, Classification and Comparison

    Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of relational data. Many watermarking techniques have been proposed in the literature to address these purposes. In this paper, the authors survey the current state-of-the-art and they classify them according...

    Provided By Journal of Universal Computer Science

  • White Papers // Dec 2010

    Integrating Personal Web Data Through Semantically Enhanced Web Portal

    Currently, the World Wide Web is mostly composed of isolated and loosely connected "Data islands". Connecting them together and retrieving only the information that is of interest to the user is the common Web usage process. Creating infrastructure that would support automation of that process by aggregating and integrating Web...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    Redundant Relations in Relational Databases: A Model Theoretic Perspective

    The authors initiate in this paper, the study of a sort of redundancy problem revealed by what they call redundant relations. Roughly, they define a redundant relation in a database instance (dbi) as a k-ary relation R such that there is a first-order query which evaluated in the reduced dbi,...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    Internal Representation of Database Views

    Although a database view embodies partial information about the state of the main schema, the state of the view schema is a quotient (and not a subset) of the state of the main schema. It is the information content of the view state, the set of sentences which are true...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    A Geometrically Enhanced Conceptual Model and Query Language

    Motivated by the authors' experiences with spatial modelling for the sustainable land use initiative they present a Geometrically enhanced ER Model (GERM), which preserves the key principles of entity-relationship modelling and at the same time introduces bulk constructors and geometric features. The model distinguishes between a syntactic level of types...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    XML Database Transformations

    Database transformations provide a unifying umbrella for queries and updates. In general, they can be characterised by five postulates, which constitute the database analogue of Gurevich's sequential ASM paper. Among these postulates the background postulate supposedly captures the particularities of data models and schemata. For the characterisation of XML database...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    Support for Schema Evolution in Data Stream Management Systems

    Unlike DataBase Management Systems (DBMSs), Data Stream Management Systems (DSMSs) do not evaluate queries over static data sets - rather, they continuously produce result streams to standing queries, and often operate in a context where any interruption can lead to data loss. Support for schema evolution in such an environment...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2010

    Impact of CPU-Bound Processes on IP Forwarding of Linux and Windows XP

    These days, Commodity-Off-The-Shelf (COTS) hardware and software are used to build high-end and powerful workstations and servers to be deployed in today's local area networks of private homes and small-to medium-sized business. Typically, these servers are multipurpose and shared - running networking functionalities involving IP packet forwarding in addition to...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2010

    Developing a Secure Mobile Grid System Through a UML Extension

    The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as those of Grid Computing which are not developed through methodologies that are adapted to their most differentiating features. A systematic development process for Grid systems...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2010

    UML Support for Designing Software Product Lines: The Package Merge Mechanism

    Software product lines have become a successful but challenging approach to software reuse. Some of the problems that hinder the adoption of this development paradigm are the conceptual gap between the variability and design models, as well as the complexity of the traceability management between them. Most current development methods...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2010

    Systematic Management of Variability in UML-Based Software Product Lines

    This paper presents SMarty, a variability management approach for UMLbased software Product Lines (PL). SMarty is supported by a UML profile, the SMartyProfile, and a process for managing variabilities, the SMartyProcess. SMartyProfile aims at representing variabilities, variation points, and variants in UML models by applying a set of stereotypes. SMartyProcess...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2010

    UML Behavior Models of Real-Time Embedded Software for Model-Driven Architecture

    Model-Driven Architecture (MDA) presents a set of layered models to separate design concerns from platform concerns. The model executability for each model element is still challenging although MDA is currently able to cope with most syntactic and transformation definition issues. Moreover, the importance of rigorous specification and verification of the...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2010

    Toward an Integrated Tool Environment for Static Analysis of UML Class and Sequence Models

    There is a need for more rigorous analysis techniques that developers can use for verifying the critical properties in UML models. The UML-based Specification Environment (USE) tool supports verification of invariants, pre-conditions, and post-conditions specified in the Object Constraint Language (OCL). Due to its animation and analysis power, it is...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2010

    An MDA Approach for Goal-Oriented Requirement Analysis in Web Engineering

    Web designers usually ignore how to model real user expectations and goals, mainly due to the large and heterogeneous audience of the Web. This fact leads to websites which are difficult to comprehend by visitors and complex to maintain by designers. In order to ameliorate this scenario, an approach for...

    Provided By Journal of Universal Computer Science

  • White Papers // Aug 2010

    User Context and Personalized Learning: A Federation of Contextualized Attention Metadata

    Nowadays, personalized education is a very hot topic in Technology Enhanced Learning (TEL) research. To support students during their learning process, the first step consists in capturing the context in which they evolve. Users typically operate in a heterogeneous environment when learning, including learning tools such as Learning Management Systems...

    Provided By Journal of Universal Computer Science

  • White Papers // Aug 2010

    A Mobile Intelligent Interruption Management System

    Mobile phones have become the most hated device that people cannot live without. For its primary usage as a communication device, it has surpassed any other medium. But it comes with a high price, interruption, anywhere anytime. These unwanted interruptions cause loss of productivity and also mostly not beneficial to...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2011

    Web Services Discovery in a Pay-As-You-Go Fashion

    Extensive effort has been brought forth to assist in web service discovery. In particular, classic Information Retrieval techniques are exploited to assess the similarity between two web services descriptions, while Semantic Web technologies are proposed to enhance semantic service descriptions. These approaches have greatly improved the quality and accuracy of...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2011

    Optimization of Gateway Deployment With Load Balancing and Interference Minimization in Wireless Mesh Networks

    In a Wireless Mesh Network (WMN), gateways act as the bridges between the mesh backbone and the Internet, and significantly affect the performance of the whole network. Hence, how to determine the optimal number and positions of gateways, i.e., gateway deployment, is one of the most important and challenging topics...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2009

    On Defining the Behavior of OR-Joins in Business Process Models

    A common approach in designing relational databases is to start with a universal relation schema, which is then decomposed into multiple subschemas. A good choice of subschemas can be determined using integrity constraints defined on the schema, such as functional, multivalued or join dependencies. In this paper, the authors propose...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    Dynamic Data Warehouse Design With Abstract State Machines

    On-Line Analytical Processing (OLAP) systems deal with analytical tasks that support decision making. As these tasks do not depend on the latest updates by transactions, it is assumed that the data required by OLAP systems are kept in a data warehouse, which separates the input from operational databases from the...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    On the Design of Secure Multimedia Authentication

    At present, the proposed authentication schemes can be classified into three categories. The first category is the watermarking authentication schemes in which the watermark is independent of the multimedia content. The second category is the signature-based authentication schemes in which the signature is generated by the multimedia content and is...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2009

    Stability in Heterogeneous Multimedia Networks Under Adversarial Attacks

    A distinguishing feature of today's large-scale platforms for multimedia distribution and communication, such as the Internet, is their heterogeneity, predominantly manifested by the fact that a variety of communication protocols are simultaneously running over different hosts. A fundamental question that naturally arises for such common settings of heterogeneous multimedia systems...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2009

    The Topology Change Attack: Threat and Impact

    Peer-To-Peer (P2P) network has received in past few years a significant attention, especially such file sharing network as eDonkey or BitTorrent. The shift from the classical client-server based paradigm of the Internet, with a clear distinction between information providers and consumers, towards consumers sharing information among each other led to...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2009

    A New Detection Method for Distributed Denial-of-Service Attack Traffic Based on Statistical Test

    This paper has proposed a new detection method for DDoS attack traffic based on two-sample t-test. The authors first investigate the statistics of normal SYN Arrival Rate (SAR) and confirm it follows normal distribution. The proposed method identifies the attack by testing the difference between incoming SAR and normal SAR,...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Advances in Homomorphic Cryptosystems

    During the last few years homomorphic encryption techniques have been studied extensively since they have become more and more important in many different cryptographic protocols such as voting protocols, lottery protocols, anonymity, privacy, and electronic auctions. This paper critically summarizes the current state-of-art of homomorphic cryptosystems. It recalls the basic...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Structural Coverage Criteria for Testing SQL Queries

    Adequacy criteria provide an objective measurement of test quality. Although these criteria are a major research issue in software testing, little work has been specifically targeted towards the testing of database-driven applications. In this paper, two structural coverage criteria are provided for evaluating the adequacy of a test suite for...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Modelling Mailing List Behaviour in Open Source Projects: the Case of ARM Embedded Linux

    One of the benefits firms can derive from using Open Source Software (OSS) is informal development collaboration, and the primary tool for collaboration and coordination are group mailing lists. The purpose of the paper is modelling mailing lists behaviour in OSS projects, using a set of descriptors that could inform...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Web 2.0 Adoption by Danish Newspapers - Urgent Need for New Business Models?

    This paper presents findings from the development process of a general innovation framework for an ongoing Nordic R&D project on e-business and media. It focuses on the current state of the Danish news media sector and the conclusions the authors can draw from the "Web 2.0 activity" of the Danish...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Multilayer Ensemble Pruning Via Novel Multi-Sub-Swarm Particle Swarm Optimization

    Recently, classifier ensemble methods are gaining more and more attention in the machine-learning and data-mining communities. In most cases, the performance of an ensemble is better than a single classifier. Many methods for creating diverse classifiers were developed during the past decade. When these diverse classifiers are generated, it is...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    A Personalized URL Re-Ranking Method Using Psychological User Browsing Characteristics

    This paper proposes a personalized URL re-ranking method based on psychological characteristics of users browsing. The characteristics are classified into three groups, which are "Common-mind," "Uncommon-mind," and "Extremely uncommon-mind." The authors' personalization method constructs an index of the anchor text retrieved from the web pages that the user has clicked...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2009

    USF-PAS: Study on Core Security Technologies for Ubiquitous Security Framework

    Ubi-Com has emerged as an exciting new paradigm to provide intelligent computing and communications at anytime and anywhere. But, In order to take the advantages of such services, it is important that intelligent security framework be suitable for Ubi-Com. In this paper, the authors propose privacy and access control scheme...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2009

    Vascular Pattern Analysis Towards Pervasive Palm Vein Authentication

    In this paper, the authors propose an Image Analysis technique for Vascular Pattern of Hand Palm, which in turn leads towards Palm Vein Authentication of an individual. Near-Infrared Image of Palm Vein pattern is taken and passed through three different processes or algorithms to process the Infrared Image in such...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2009

    Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network

    Operations of mobile ad hoc networks rely on the collaboration of participating nodes to route data for each other. This standard approach using a fixed set of nodes for each communication link cannot cope with high mobility due to a high frequency of link breaks. A recent approach based on...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2009

    A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security

    Pervasive smart computing environments make people get accustomed to convenient and secure services. The overall goal of this research is to classify vehicles along the I215 freeway in Salt Lake City, USA. This information will be used to predict future roadway needs and the expected life of a roadway. The...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2009

    Development of a Web Application for Management of Learning Styles

    Information and Communication Technologies (ICT) permit the innovation of teaching and learning processes. ICT allow teachers to create or select and adjust contents that take advantage of the digital environment and interaction between peers. Teaching methodologies and strategies should be adjusted to the learning styles of students, offering them, in...

    Provided By Journal of Universal Computer Science

  • White Papers // Apr 2009

    Designing Secure Data Warehouses by Using MDA and QVT

    The Data Warehouse (DW) design is based on MultiDimensional (MD) modeling which structures information into facts and dimensions. Due to the confidentiality of the data that it stores, it is crucial to specify security and audit measures from the early stages of design and to enforce them throughout the life-cycle....

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme

    Node churn is a hindrance to construction of P2P-based anonymous networks, which makes anonymous paths fragile and results in message losses and communication failures. A collaboration scheme combining Friendly Neighbor-based Incentive (FNI) and Re-encryption mechanism is proposed to deal with the high node churn characteristic of P2P networks. The FNI...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    MC-Supporter: Flexible Mobile Computing Supporting Learning Though Social Interactions

    Nowadays, the authors are experiencing a rapid development in mobile computing because of the sinking prices of the mobile devices and the availability of wireless networks that can connect them. The ability of many of these devices to set up ad-hoc networks by proximity allows face-to-face interaction combined with mobility....

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    A QoS Perspective on Exception Diagnosis in Service- Oriented Computing

    Unlike object-oriented applications it is difficult to address exceptions in multi-agent systems due to their highly dynamic and autonomous nature. The authors' previous work has examined exception diagnosis in multi-agent systems based on a heuristic classification method. In this paper, they extend their work by applying an exception diagnosis method...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    Supporting Awareness in Groupware Through an Aspect- Oriented Middleware Service

    Solutions have been proposed to support awareness in groupware. Frequently, this requirement is fulfilled by similar functionalities that are implemented in different modules within these collaborative applications. These solutions usually represent crosscut concerns related to awareness by the use of object-oriented programming. As a result, tightly coupled components are generated...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    Pattern-Oriented Workflow Generation and Optimization

    Automatic workflow generation is becoming an active research area for dealing with the dynamics of grid infrastructure, because it has a pervasive impact on system usability, flexibility and robustness. Artificial intelligence technology and explicit knowledge have been exploited in some research for workflow construction or composition. With the increasing use...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    Integrating Semantic Web and Object-Oriented Programming for Cooperative Design

    Object-Oriented Programming (OOP) is a mainstream paradigm for engineering design software tool development. An emerging requirement is the introduction of semantics to achieve heterogeneous information sharing, but many challenges exist. Examples include using object methods to manipulate an RDF data, automatically converting data into RDF format, and supporting various programming...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    Transmission Latency Based Network Friendly Tree for Peer-To-Peer Streaming

    In Peer-To-Peer(P2P) streaming system, the multicasting tree construction method influences considerably on network load. Under current available strategies, network resources are not used economically, or network resource friendship and the flexibility can't be approached thoroughly. With the increasing application of Internet, network infrastructure itself becomes a precious resource, which should...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    Updates, Schema Updates and Validation of XML Documents - Using Abstract State Machines With Automata-Defined States

    The exact validation of streaming XML documents can be realised by using Visibly Push-down Automata (VPA) that are defined by Extended Document Type Definitions (EDTD). It is straightforward to represent such an automaton as an Abstract State Machine (ASM). In doing so, the authors enable computations on abstract states that...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    SQL/XML Hierarchical Query Performance Analysis in an XML-Enabled Database System

    The increase utilization of XML structure for data representation, exchange, and integration has strengthened the need for an efficient storage and retrieval of XML data. Currently, there are two major streams of XML data repositories. The first stream is the Native XML database systems which are built solely to store...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    An Agent for Web-Based Structured Hypermedia Algorithm Explanation System

    Studying and understanding algorithms is important for all computer scientists. Over two decades of research has been devoted to improving algorithm visualization and algorithm explanation techniques. Knowledge gained from these practices allows them to design and implement logically correct programs with considerations to run-time and memory constraints. For many students,...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2009

    Application Framework With Demand-Driven Mashup for Selective Browsing

    The authors are developing a new mashup framework for creating flexible applications in which users can selectively browse through mashup items. The framework provides GUI components called widgets through which users can browse mashed-up data selectively, and the system processes demand-driven creation of mashed-up data upon receiving access requests through...

    Provided By Journal of Universal Computer Science

  • White Papers // Jun 2009

    An Approach for Estimating Execution Time Probability Distributions of Component-Based Real-Time Systems

    In recent years, many component-based real-time systems have been proposed as a solution to modular and easily maintainable distributed real-time systems. This paper proposes a methodology for estimating probability distributions of execution times in the context of such systems, where no access to component internal code is assumed. In order...

    Provided By Journal of Universal Computer Science

  • White Papers // Jun 2009

    Mining Dynamic Databases Using Probability-Based Incremental Association Rule Discovery Algorithm

    In dynamic databases, new transactions are appended as time advances. This paper is concerned with applying an incremental association rule mining to extract interesting information from a dynamic database. An incremental association rule discovery can create an intelligent environment such that new information or knowledge such as changing customer preferences...

    Provided By Journal of Universal Computer Science

  • White Papers // Jul 2009

    A Load Balancing and Congestion-Avoidance Routing Mechanism for Teal-Time Traffic Over Vehicular Networks

    With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Resource management for real-time traffic has widely been recognized as one of the most challenging problems for seamless access to vehicular networks. In...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    SeAAS - A Reference Architecture for Security Services in SOA

    Decentralized security models and distributed infrastructures of scenarios based on Service Oriented Architectures make the enforcement of security policies a key challenge - all the more so for business processes spanning over multiple enterprises. The current practice to implement security functionality exclusively at the endpoint places a significant processing burden...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    Information Theoretically Secure Encryption With Almost Free Authentication

    In cryptology, secure channels enable the exchange of messages in a confidential and authenticated manner. The literature of cryptology is rich with proposals and analysis that address the secure communication over public (insecure) channels. In this paper, the authors propose information theoretically secure direction for the construction of secure channels....

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    ModelSec: A Generative Architecture for Model-Driven Security

    Increasingly, the success of software systems depends largely on how their security requirements are satisfied. However, developers are challenged in implementing these requirements, mainly because of the gap between the specification and implementation, and the technical complexities of the current software infrastructures. Recently, Model-Driven Security has emerged as a new...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    A System for Managing Security Knowledge Using Case Based Reasoning and Misuse Cases

    Making secure a software system is a very critical purpose, especially because it is very hard to consolidate an exhaustive body of knowledge about security risks and related countermeasures. To define a technological infrastructure for exploiting this knowledge poses many challenges. This paper introduces a system to capture, share and...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2009

    Understanding Tools and Practices for Distributed Pair Programming

    When considering the principles for eXtreme Programming, distributed eXtreme Programming, especially distributed pair programming, is a paradox predetermined to failure. However, global software development as well as the outsourcing of software development are integral parts of software projects. Hence, the support for distributed pair programming is still a challenging field...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2009

    Protecting Mobile TV Multimedia Content in DVB/GPRS Heterogeneous Wireless Networks

    Normally, the multimedia content provider and network service providers are separated in mobile TV systems. The TV programs are broadcasted from the content provider to the mobile terminals through Digital Video Broadcasting Transmission System for Handheld Terminals (DVB-H), and the access information is unicasted from the service provider to the...

    Provided By Journal of Universal Computer Science