Journal of Universal Computer Science

Displaying 1-40 of 139 results

  • White Papers // Jan 2010

    Position-Based Routing Protocol for Low Power Wireless Sensor Networks

    This paper presents a table-less position based routing scheme for low power data centric wireless sensor networks. The proposed scheme is localized, uses greedy forwarding approach, and does not rely on neighborhood information. These characteristics reduce the communication overhead (no neighborhood information exchange), make the protocol highly scalable (no routing...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    SeAAS - A Reference Architecture for Security Services in SOA

    Decentralized security models and distributed infrastructures of scenarios based on Service Oriented Architectures make the enforcement of security policies a key challenge - all the more so for business processes spanning over multiple enterprises. The current practice to implement security functionality exclusively at the endpoint places a significant processing burden...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    Information Theoretically Secure Encryption With Almost Free Authentication

    In cryptology, secure channels enable the exchange of messages in a confidential and authenticated manner. The literature of cryptology is rich with proposals and analysis that address the secure communication over public (insecure) channels. In this paper, the authors propose information theoretically secure direction for the construction of secure channels....

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    ModelSec: A Generative Architecture for Model-Driven Security

    Increasingly, the success of software systems depends largely on how their security requirements are satisfied. However, developers are challenged in implementing these requirements, mainly because of the gap between the specification and implementation, and the technical complexities of the current software infrastructures. Recently, Model-Driven Security has emerged as a new...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    A System for Managing Security Knowledge Using Case Based Reasoning and Misuse Cases

    Making secure a software system is a very critical purpose, especially because it is very hard to consolidate an exhaustive body of knowledge about security risks and related countermeasures. To define a technological infrastructure for exploiting this knowledge poses many challenges. This paper introduces a system to capture, share and...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2009

    Understanding Tools and Practices for Distributed Pair Programming

    When considering the principles for eXtreme Programming, distributed eXtreme Programming, especially distributed pair programming, is a paradox predetermined to failure. However, global software development as well as the outsourcing of software development are integral parts of software projects. Hence, the support for distributed pair programming is still a challenging field...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2011

    Using the Affect Grid to Measure Emotions in Software Requirements Engineering

    Computer systems are designed and used by humans. And human being is characterized, among other things, by emotions. Giving this fact, the process of designing and developing computer systems is, like any other facet in the people lives, driven by emotions. Requirements engineering is one of the main phases in...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2011

    Multimedia Modules and Virtual Organization Website for Collaborative Research Experience for Teachers in STEM

    Wireless enabled cyber physical systems and applications, highly interactive multimedia modules, and virtual organization tools and capabilities provide attractive avenues for boosting interest and improving teaching effectiveness of STEM courses in schools. In this paper, the authors describe the Research Experience for Teachers (RET) - Hawaii program and present features...

    Provided By Journal of Universal Computer Science

  • White Papers // Jul 2011

    Performance Evaluation of Snort Under Windows 7 and Windows Server 2008

    Snort is the most widely deployed Network Intrusion Detection System (NIDS) worldwide, with millions of downloads to date. PC-based Snort typically runs on either Linux or Windows operating systems. In this paper, the authors present an experimental evaluation and comparison of the performance of Snort NIDS when running under the...

    Provided By Journal of Universal Computer Science

  • White Papers // Jul 2011

    RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks

    In-network data aggregation has a great impact on the energy consumption in large-scale wireless sensor networks. However, the resource constraints and vulnerable deployment environments challenge the application of this technique in terms of security and efficiency. A compromised node may forge arbitrary aggregation value and mislead the base station into...

    Provided By Journal of Universal Computer Science

  • White Papers // Aug 2011

    Recommending Open Linked Data in Creativity Sessions Using Web Portals With Collaborative Real Time Environment

    In this paper, the authors describe a concept of the recommender system for collaborative real time web based editing in the context of creativity sessions. The collaborative real time editing provides creativity teams of which members are physically distributed with an emulation of the synchronous collaboration where presence of the...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2011

    Software Process Definition: A Reuse-Based Approach

    Software product development has been taking advantage of reuse techniques for some decades. Concepts like software components, architectures, and product lines have been successfully applied in several contexts to develop software products, although some difficulties are still faced. Software processes have strong similarities with software products, and some researchers argue...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2011

    Achieving Transparent & Real-Time Collaboration in Co- AutoCAD Application

    In order to support the real-time collaboration between geographically distributed designers, the single-user application AutoCAD is required to be transformed transparently into groupware system by adopting fully replicated architecture. As the core issue to maintain the consistency of the distributed replicas, traditional consistency maintenance algorithms (such as Operation Transformation and...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2011

    Web Services Discovery in a Pay-As-You-Go Fashion

    Extensive effort has been brought forth to assist in web service discovery. In particular, classic Information Retrieval techniques are exploited to assess the similarity between two web services descriptions, while Semantic Web technologies are proposed to enhance semantic service descriptions. These approaches have greatly improved the quality and accuracy of...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2011

    Optimization of Gateway Deployment With Load Balancing and Interference Minimization in Wireless Mesh Networks

    In a Wireless Mesh Network (WMN), gateways act as the bridges between the mesh backbone and the Internet, and significantly affect the performance of the whole network. Hence, how to determine the optimal number and positions of gateways, i.e., gateway deployment, is one of the most important and challenging topics...

    Provided By Journal of Universal Computer Science

  • White Papers // Sep 2009

    Dynamic Data Warehouse Design With Abstract State Machines

    On-Line Analytical Processing (OLAP) systems deal with analytical tasks that support decision making. As these tasks do not depend on the latest updates by transactions, it is assumed that the data required by OLAP systems are kept in a data warehouse, which separates the input from operational databases from the...

    Provided By Journal of Universal Computer Science

  • White Papers // Dec 2010

    Watermarking Techniques for Relational Databases: Survey, Classification and Comparison

    Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of relational data. Many watermarking techniques have been proposed in the literature to address these purposes. In this paper, the authors survey the current state-of-the-art and they classify them according...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2009

    LCP-Nets: A Linguistic Approach for Non-Functional Preferences in a Semantic SOA Environment

    This paper addresses the problem of expressing preferences among nonfunctional properties of services in a Web service architecture. In such a context, semantic and non-functional annotations are required on service declarations and business process calls to services in order to select the best available service for each invocation. To cope...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2010

    A Model for Capturing and Managing Software Engineering Knowledge and Experience

    During software development projects there is always a particular working "Product" that is generated but rarely managed: the knowledge and experience that team members acquire. This knowledge and experience, if conveniently managed, can be reused in future software projects and be the basis for process improvement initiatives. In this paper,...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2010

    Performance Optimizations for DAA Signatures on Java Enabled Platforms

    With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the computational requirements of public-key cryptosystems are often beyond the constraints embedded processors are bound to. This is especially true for cryptosystems that make heavy use of...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2010

    Towards a Virtual Trusted Platform

    The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisation platform for security sensitive software modules. The amalgam of these technologies allows an attractive off-the-shelf environment, capable of supporting security levels potentially higher than commonly deployed...

    Provided By Journal of Universal Computer Science

  • White Papers // Oct 2010

    Impact of CPU-Bound Processes on IP Forwarding of Linux and Windows XP

    These days, Commodity-Off-The-Shelf (COTS) hardware and software are used to build high-end and powerful workstations and servers to be deployed in today's local area networks of private homes and small-to medium-sized business. Typically, these servers are multipurpose and shared - running networking functionalities involving IP packet forwarding in addition to...

    Provided By Journal of Universal Computer Science

  • White Papers // Dec 2010

    Integrating Personal Web Data Through Semantically Enhanced Web Portal

    Currently, the World Wide Web is mostly composed of isolated and loosely connected "Data islands". Connecting them together and retrieving only the information that is of interest to the user is the common Web usage process. Creating infrastructure that would support automation of that process by aggregating and integrating Web...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    Redundant Relations in Relational Databases: A Model Theoretic Perspective

    The authors initiate in this paper, the study of a sort of redundancy problem revealed by what they call redundant relations. Roughly, they define a redundant relation in a database instance (dbi) as a k-ary relation R such that there is a first-order query which evaluated in the reduced dbi,...

    Provided By Journal of Universal Computer Science

  • White Papers // Aug 2010

    User Context and Personalized Learning: A Federation of Contextualized Attention Metadata

    Nowadays, personalized education is a very hot topic in Technology Enhanced Learning (TEL) research. To support students during their learning process, the first step consists in capturing the context in which they evolve. Users typically operate in a heterogeneous environment when learning, including learning tools such as Learning Management Systems...

    Provided By Journal of Universal Computer Science

  • White Papers // Aug 2010

    A Mobile Intelligent Interruption Management System

    Mobile phones have become the most hated device that people cannot live without. For its primary usage as a communication device, it has surpassed any other medium. But it comes with a high price, interruption, anywhere anytime. These unwanted interruptions cause loss of productivity and also mostly not beneficial to...

    Provided By Journal of Universal Computer Science

  • White Papers // Jul 2010

    Supporting Mobile Users in Selecting Target Devices

    The availability of applications able to exploit multi-device environments is steadily increasing. Rather than using all devices in the same way, users tend to assign different roles to devices due to the capabilities needed, such as computational power and screen size. Researchers and developers have started to introduce various techniques...

    Provided By Journal of Universal Computer Science

  • White Papers // Jul 2010

    Toward the Next Wave of Services: Linked Services for the Web of Data

    It has often been argued that Web services would have a tremendous impact on the Web, as a core enabling technology supporting a highly efficient service-based economy at a global scale. However, despite the outstanding progress in the area, the authors are still to witness the application of Web services...

    Provided By Journal of Universal Computer Science

  • White Papers // Jul 2010

    Service Networks Modelling: An SOA & BPM Standpoint

    Services are quintessential in the current economical landscape. Enterprises and businesses at large rely on the consumption and providing of services to ensure their operations and to realize their business offers. That is, nowadays businesses all over the world are interconnected with each other by complex service-centric webs called service...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2010

    Classifying and Tracking Free Riders in Multimedia-Based Systems

    The ever-growing explosion in technological advancements is paving the way to the expansion of multimedia applications. Unfortunately, current multimedia applications use centralized architectures. Before decentralized architectures are utilized and used, some issues related to decentralization must be addressed. In this paper, the authors focus on the problem of free riding...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2010

    A Service-Oriented Platform for Ubiquitous Personalized Multimedia Provisioning

    As multimedia contents are becoming widely used in ubiquitous computing environments among many application fields, e.g., education, entertainment, and live surveillance, the demand of personalized access to these contents has increased dramatically. The provisioning of Ubiquitous Personalized Multimedia Services (UPMSs) is a challenging task, which involves a lot of heterogeneous...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2010

    Knowledge Authoring With ORE: Testing, Debugging and Validating Knowledge Rules in a Semantic Web Framework

    Ontology rule editing, testing, debugging and validation are still handcrafted and painful tasks. Nowadays, there is a lack of tools that take these tasks into consideration in order to ease the work of the developer. This paper is devoted to explain how the people have come to a new tool,...

    Provided By Journal of Universal Computer Science

  • White Papers // May 2010

    Classification of Software for the Simulation of Light Scattering and Realization Within an Internet Information Portal

    Light scattering studies are done by researchers of various scientific areas. As the calculation of the scattering behavior by small particles is rather complex, corresponding programs usually can be used for specific problems only and therefore a multitude of programs have been developed over the years. To enable researchers to...

    Provided By Journal of Universal Computer Science

  • White Papers // Jan 2011

    Visualizing and Analyzing the Quality of XML Documents

    In this paper, the authors introduce eXVisXML, a visual tool to explore documents annotated with the mark-up language XML, in order to easily perform over them tasks as knowledge extraction or document engineering. eXVisXML was designed mainly for two kind of users. Those who want to analyze an annotated document...

    Provided By Journal of Universal Computer Science

  • White Papers // Feb 2011

    On the Construction of Efficiently Navigable Tag Clouds Using Knowledge From Structured Web Content

    In this paper, the authors present an approach to improving navigability of a hierarchically structured Web content. The approach is based on an integration of a tagging module and adoption of tag clouds as a navigational aid for such content. The main idea of this approach is to apply tagging...

    Provided By Journal of Universal Computer Science

  • White Papers // Mar 2011

    Modeling Quality Attributes With Aspect-Oriented Architectural Templates

    The quality attributes of a software system are, to a large extent, determined by the decisions taken early in the development process. Best practices in software engineering recommend the identification of important quality attributes during the requirements elicitation process, and the specification of software architectures to satisfy these requirements. Over...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    Internal Representation of Database Views

    Although a database view embodies partial information about the state of the main schema, the state of the view schema is a quotient (and not a subset) of the state of the main schema. It is the information content of the view state, the set of sentences which are true...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    A Geometrically Enhanced Conceptual Model and Query Language

    Motivated by the authors' experiences with spatial modelling for the sustainable land use initiative they present a Geometrically enhanced ER Model (GERM), which preserves the key principles of entity-relationship modelling and at the same time introduces bulk constructors and geometric features. The model distinguishes between a syntactic level of types...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    XML Database Transformations

    Database transformations provide a unifying umbrella for queries and updates. In general, they can be characterised by five postulates, which constitute the database analogue of Gurevich's sequential ASM paper. Among these postulates the background postulate supposedly captures the particularities of data models and schemata. For the characterisation of XML database...

    Provided By Journal of Universal Computer Science

  • White Papers // Nov 2010

    Support for Schema Evolution in Data Stream Management Systems

    Unlike DataBase Management Systems (DBMSs), Data Stream Management Systems (DSMSs) do not evaluate queries over static data sets - rather, they continuously produce result streams to standing queries, and often operate in a context where any interruption can lead to data loss. Support for schema evolution in such an environment...

    Provided By Journal of Universal Computer Science