Karlstad University

Displaying 1-20 of 20 results

  • White Papers // May 2013

    ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship

    Deep packet inspection technology became a cornerstone of Internet censorship by facilitating cheap and effective filtering of what censors consider undesired information. Moreover, filtering is not limited to simple pattern matching but makes use of sophisticated techniques such as active probing and protocol classification to block access to popular circumvention...

    Provided By Karlstad University

  • White Papers // Dec 2012

    Sharpening the Knowledge Domain Transfer in Practice Research Design: The BPM Assessment

    The practice research design described in this paper is based on the common interest of Telge AB and Karlstad University to explore knowledge transfer from research results to their use in practice when applying a Business Process Management (BPM) maturity assessment model. In this paper, the authors explore how knowledge...

    Provided By Karlstad University

  • White Papers // Sep 2012

    Accountability for Cloud and Other Future Internet Services

    Cloud and IT service providers should act as responsible stewards for the data of their customers and users. However, the current absence of accountability frameworks for distributed IT services makes it difficult for users to understand, influence and determine how their service providers honour their obligations. The A4Cloud project will...

    Provided By Karlstad University

  • White Papers // May 2012

    Enhanced Metric Caching for Short TCP Flows

    Internet-based applications that require low latency are becoming more common. Such applications typically generate traffic consisting of short, or bursty, TCP flows. As TCP, instead, is designed to optimize the throughput of long bulk flows there is an apparent mismatch. To overcome this, a lot of research has recently focused...

    Provided By Karlstad University

  • White Papers // May 2012

    Lean Integration Using Open Source Based Infrastructure and an Integration Competency Center Approach

    In this paper a set of successful enterprise application Integration projects are analyzed and common characteristics are identified. These characteristics are then distilled into a set of key success factors. The empirical foundation for this study is the active participation in a number of successful EAI projects, as a consequence...

    Provided By Karlstad University

  • White Papers // Jan 2012

    An Experimental Study on the Performance and Fairness of Loss Differentiation for TCP

    This paper investigates the performance and fairness of receiver-based loss differentiation for TCP. Experiments have been performed with a FreeBSD kernel implementation. As expected, the results verify the effectiveness of receiver-based loss differentiation when corruption losses are present. However, if the corrupting link is shared with users that do not...

    Provided By Karlstad University

  • White Papers // Mar 2011

    OpenFlow for Wireless Mesh Networks

    Several protocols for routing and forwarding in Wireless Mesh Networks (WMN) have been proposed, such as AODV, OLSR or B.A.T.M.A.N. However, providing support for e.g. flowbased routing where flows of one source take different paths through the network is hard to implement in a unified way using traditional routing protocols....

    Provided By Karlstad University

  • White Papers // Nov 2010

    Peer-to-Peer Selection and Channel Assignment for Wireless Mesh Networks

    Wireless mesh networks are an emerging paradigm for future broadband wireless access networks, with many application areas ranging from content distribution over community networking and providing backhaul networking for sensor devices. In wireless mesh networks, clients connect to wireless routers which are equipped with one or more wireless cards and...

    Provided By Karlstad University

  • White Papers // Oct 2010

    Cognitive Multi-Radio Mesh Networks on ISM Bands: A Cross-Layer Architecture

    A Wireless Mesh Network (WMN) has been popularly researched as a wireless backbone for Internet access with off-the-shelf and inexpensive equipments. Nowadays, several applications like contents sharing, multicast video streaming and vehicular networks encourage to build mesh networks in urban areas. However, the deployment of WMNs in unlicensed bands of...

    Provided By Karlstad University

  • White Papers // Sep 2010

    Urban-X: Towards Distributed Channel Assignment in Cognitive Multi-Radio Mesh Networksuting in Mobile Ad Hoc and Sensor Networks

    Researches about multi-radio mesh networks have mostly focused on channel allocation under internal interference. However, the deployment of WMNs in unlicensed bands of dense urban areas imposes many challenges regarding co-existence with residential access points. In this paper, the authors propose Urban-X, which is a first attempt towards a new...

    Provided By Karlstad University

  • White Papers // Aug 2010

    Contracts As Cornerstones In Relationship Building

    The aim of this paper is to investigate the significance of contracts in long-term relationship building comparing public and private contexts. In order to investigate this authors have addressed literature about relationship building, negotiation process and the role of contracts. This paper takes a qualitative approach and is based on...

    Provided By Karlstad University

  • White Papers // Aug 2010

    Practical Considerations for Channel Assignment in Wireless Mesh Networks

    In multi-radio Wireless Mesh Networks (WMNs) several radios can operate within one node simultaneously on different channels. Due to frequency selective fading and varying output powers of WLAN cards the received signal strength on channels in the U-NII band can differ by several dB. Furthermore, power leakage from neighboring channels...

    Provided By Karlstad University

  • White Papers // May 2010

    Measuring the Impact of ACI in Cognitive Multi-Radio Mesh Networks

    In this paper, the authors address the impact of ACI on dynamic spectrum allocation in multi-radio systems. In particular, they present the benefits of dynamic spectrum allocation by adapting channel width and distance in order to mitigate ACI in multi-radio mesh networks. Based on their measurement campaign in an indoor...

    Provided By Karlstad University

  • White Papers // Apr 2010

    FUZPAG: A Fuzzy-Controlled Packet Aggregation Scheme for Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are wireless multi-hop backhaul networks in which mesh routers relay traffic on behalf of clients or other routers. Due to large MAC layer overhead, applications such as Voice over IP, which send many small packets, show poor performance in WMNs. Packet aggregation increases the capacity of...

    Provided By Karlstad University

  • White Papers // May 2009

    Towards Secure SIP Signalling Service for VoIP Applications

    Current Voice over IP (VoIP) services are regarded less secure than the traditional Public Switched Telephone Network (PSTN). This is due to the fact that VoIP services are frequently deployed in an relatively open environment, so that VoIP infrastructures can be easily accessed by potential attackers. Furthermore, current VoIP services...

    Provided By Karlstad University

  • White Papers // Apr 2009

    Minimizing DHT Routing Stretch in MANETs

    Since the appearance of Napster in early 1999, Peer-To-Peer (P2P) networks have experienced tremendous growth. The P2P architectures can be categorized into two main classes: unstructured and structured P2P overlays. Unstructured overlays do not impose a rigid relation between the overlay topology and the indices/resources placement, as flooding or random...

    Provided By Karlstad University

  • White Papers // Mar 2009

    Toward a Formal Framework to Evaluate Wireless Sensor Network Security

    Wireless Sensor Networks (WSNs) are becoming widespread and pervasive, even in context where dependability and security of the deployed network could be crucial to critical and life-saving tasks. Due to the evolution rush experienced in past few years, several security aspects need to be further investigated. In this paper, the...

    Provided By Karlstad University

  • White Papers // Mar 2009

    Broadband to Improve M-Content: How the Internet Improves Life in Emerging Markets

    What impact does the Internet have on everyday life in emerging markets? What effect does it have on people's ability to communicate, share information, conduct business, travel, learn and access healthcare? To answer these questions and gain deeper understanding of the potential benefits of Internet access, Ericsson carried out a...

    Provided By Karlstad University

  • White Papers // Aug 2008

    From The Seller's Offering To The Customer's Needing In A Business-To-Business Setting

    Views on industrial service have conceptually progressed from the output of the provider's production process to the result of an interaction process in which the customer also is involved. An industrial company's offering often consisting of both goods and services is, however, inherently seller-oriented even if, especially when the focus...

    Provided By Karlstad University

  • White Papers // Aug 2008

    Creating New Market Space Business Development And Relationship Building In New Ventures

    The rate of technological change and speed of technological diffusion are high in most industries. Structural changes and globalisation based on worldwide economic development are also adding to the complexity and uncertainty for many firms. However, the resulting market disequilibrium is also representing opportunities for entrepreneurial firms and creates possibilities...

    Provided By Karlstad University

  • White Papers // May 2009

    Towards Secure SIP Signalling Service for VoIP Applications

    Current Voice over IP (VoIP) services are regarded less secure than the traditional Public Switched Telephone Network (PSTN). This is due to the fact that VoIP services are frequently deployed in an relatively open environment, so that VoIP infrastructures can be easily accessed by potential attackers. Furthermore, current VoIP services...

    Provided By Karlstad University

  • White Papers // Aug 2008

    From The Seller's Offering To The Customer's Needing In A Business-To-Business Setting

    Views on industrial service have conceptually progressed from the output of the provider's production process to the result of an interaction process in which the customer also is involved. An industrial company's offering often consisting of both goods and services is, however, inherently seller-oriented even if, especially when the focus...

    Provided By Karlstad University

  • White Papers // Aug 2008

    Creating New Market Space Business Development And Relationship Building In New Ventures

    The rate of technological change and speed of technological diffusion are high in most industries. Structural changes and globalisation based on worldwide economic development are also adding to the complexity and uncertainty for many firms. However, the resulting market disequilibrium is also representing opportunities for entrepreneurial firms and creates possibilities...

    Provided By Karlstad University

  • White Papers // Aug 2010

    Contracts As Cornerstones In Relationship Building

    The aim of this paper is to investigate the significance of contracts in long-term relationship building comparing public and private contexts. In order to investigate this authors have addressed literature about relationship building, negotiation process and the role of contracts. This paper takes a qualitative approach and is based on...

    Provided By Karlstad University

  • White Papers // Sep 2010

    Urban-X: Towards Distributed Channel Assignment in Cognitive Multi-Radio Mesh Networksuting in Mobile Ad Hoc and Sensor Networks

    Researches about multi-radio mesh networks have mostly focused on channel allocation under internal interference. However, the deployment of WMNs in unlicensed bands of dense urban areas imposes many challenges regarding co-existence with residential access points. In this paper, the authors propose Urban-X, which is a first attempt towards a new...

    Provided By Karlstad University

  • White Papers // Oct 2010

    Cognitive Multi-Radio Mesh Networks on ISM Bands: A Cross-Layer Architecture

    A Wireless Mesh Network (WMN) has been popularly researched as a wireless backbone for Internet access with off-the-shelf and inexpensive equipments. Nowadays, several applications like contents sharing, multicast video streaming and vehicular networks encourage to build mesh networks in urban areas. However, the deployment of WMNs in unlicensed bands of...

    Provided By Karlstad University

  • White Papers // Mar 2011

    OpenFlow for Wireless Mesh Networks

    Several protocols for routing and forwarding in Wireless Mesh Networks (WMN) have been proposed, such as AODV, OLSR or B.A.T.M.A.N. However, providing support for e.g. flowbased routing where flows of one source take different paths through the network is hard to implement in a unified way using traditional routing protocols....

    Provided By Karlstad University

  • White Papers // Aug 2010

    Practical Considerations for Channel Assignment in Wireless Mesh Networks

    In multi-radio Wireless Mesh Networks (WMNs) several radios can operate within one node simultaneously on different channels. Due to frequency selective fading and varying output powers of WLAN cards the received signal strength on channels in the U-NII band can differ by several dB. Furthermore, power leakage from neighboring channels...

    Provided By Karlstad University

  • White Papers // Nov 2010

    Peer-to-Peer Selection and Channel Assignment for Wireless Mesh Networks

    Wireless mesh networks are an emerging paradigm for future broadband wireless access networks, with many application areas ranging from content distribution over community networking and providing backhaul networking for sensor devices. In wireless mesh networks, clients connect to wireless routers which are equipped with one or more wireless cards and...

    Provided By Karlstad University

  • White Papers // May 2010

    Measuring the Impact of ACI in Cognitive Multi-Radio Mesh Networks

    In this paper, the authors address the impact of ACI on dynamic spectrum allocation in multi-radio systems. In particular, they present the benefits of dynamic spectrum allocation by adapting channel width and distance in order to mitigate ACI in multi-radio mesh networks. Based on their measurement campaign in an indoor...

    Provided By Karlstad University

  • White Papers // Mar 2009

    Toward a Formal Framework to Evaluate Wireless Sensor Network Security

    Wireless Sensor Networks (WSNs) are becoming widespread and pervasive, even in context where dependability and security of the deployed network could be crucial to critical and life-saving tasks. Due to the evolution rush experienced in past few years, several security aspects need to be further investigated. In this paper, the...

    Provided By Karlstad University

  • White Papers // Mar 2009

    Broadband to Improve M-Content: How the Internet Improves Life in Emerging Markets

    What impact does the Internet have on everyday life in emerging markets? What effect does it have on people's ability to communicate, share information, conduct business, travel, learn and access healthcare? To answer these questions and gain deeper understanding of the potential benefits of Internet access, Ericsson carried out a...

    Provided By Karlstad University

  • White Papers // Apr 2010

    FUZPAG: A Fuzzy-Controlled Packet Aggregation Scheme for Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are wireless multi-hop backhaul networks in which mesh routers relay traffic on behalf of clients or other routers. Due to large MAC layer overhead, applications such as Voice over IP, which send many small packets, show poor performance in WMNs. Packet aggregation increases the capacity of...

    Provided By Karlstad University

  • White Papers // Apr 2009

    Minimizing DHT Routing Stretch in MANETs

    Since the appearance of Napster in early 1999, Peer-To-Peer (P2P) networks have experienced tremendous growth. The P2P architectures can be categorized into two main classes: unstructured and structured P2P overlays. Unstructured overlays do not impose a rigid relation between the overlay topology and the indices/resources placement, as flooding or random...

    Provided By Karlstad University

  • White Papers // Jan 2012

    An Experimental Study on the Performance and Fairness of Loss Differentiation for TCP

    This paper investigates the performance and fairness of receiver-based loss differentiation for TCP. Experiments have been performed with a FreeBSD kernel implementation. As expected, the results verify the effectiveness of receiver-based loss differentiation when corruption losses are present. However, if the corrupting link is shared with users that do not...

    Provided By Karlstad University

  • White Papers // May 2012

    Enhanced Metric Caching for Short TCP Flows

    Internet-based applications that require low latency are becoming more common. Such applications typically generate traffic consisting of short, or bursty, TCP flows. As TCP, instead, is designed to optimize the throughput of long bulk flows there is an apparent mismatch. To overcome this, a lot of research has recently focused...

    Provided By Karlstad University

  • White Papers // May 2012

    Lean Integration Using Open Source Based Infrastructure and an Integration Competency Center Approach

    In this paper a set of successful enterprise application Integration projects are analyzed and common characteristics are identified. These characteristics are then distilled into a set of key success factors. The empirical foundation for this study is the active participation in a number of successful EAI projects, as a consequence...

    Provided By Karlstad University

  • White Papers // Dec 2012

    Sharpening the Knowledge Domain Transfer in Practice Research Design: The BPM Assessment

    The practice research design described in this paper is based on the common interest of Telge AB and Karlstad University to explore knowledge transfer from research results to their use in practice when applying a Business Process Management (BPM) maturity assessment model. In this paper, the authors explore how knowledge...

    Provided By Karlstad University

  • White Papers // Sep 2012

    Accountability for Cloud and Other Future Internet Services

    Cloud and IT service providers should act as responsible stewards for the data of their customers and users. However, the current absence of accountability frameworks for distributed IT services makes it difficult for users to understand, influence and determine how their service providers honour their obligations. The A4Cloud project will...

    Provided By Karlstad University

  • White Papers // May 2013

    ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship

    Deep packet inspection technology became a cornerstone of Internet censorship by facilitating cheap and effective filtering of what censors consider undesired information. Moreover, filtering is not limited to simple pattern matching but makes use of sophisticated techniques such as active probing and protocol classification to block access to popular circumvention...

    Provided By Karlstad University