Lancaster University

Displaying 1-40 of 107 results

  • White Papers // May 2013

    Experiences of Using a Hybrid Cloud to Construct an Environmental Virtual Observatory

    Environmental science is often fragmented: data is collected using mismatched formats and conventions, and models are misaligned and run in isolation. Cloud computing offers a lot of potential in the way of resolving such issues by supporting data from different sources and at various scales, by facilitating the integration of...

    Provided By Lancaster University

  • White Papers // Nov 2012

    Service-Centric Networking Extensions

    This paper discusses several issues of Service-Centric Networking (SCN) as an extension of the Information-Centric Networking (ICN) paradigm. SCN allows extended caching, where not exactly the same content as requested can be read from caches, but similar content can be used to produce the content requested, e.g., by filtering or...

    Provided By Lancaster University

  • White Papers // Nov 2012

    Evaluation of the Socio-Economic Implications of Contractual Mobility in Roaming Architectures

    The European market for roaming services has historically experienced poor or no competition and, when competition has occurred, prices have been largely resistant to its downward pressure. The root cause of this failure lies in the technical limitations of the existing roaming architecture. An architecture able to remove these limitations...

    Provided By Lancaster University

  • White Papers // Nov 2012

    Interaction-Oriented Software Engineering: Concepts and Principles

    Following established tradition, software engineering today is rooted in a conceptually centralized way of thinking. The primary SE artifact is a specification of a machine - a computational artifact - that would meet the (elicited and) stated requirements. Therein lies a fundamental mismatch with (open) sociotechnical systems, which involve multiple...

    Provided By Lancaster University

  • White Papers // Jul 2012

    UACAP: A Unified Auxiliary Channel Authentication Protocol

    Authenticating spontaneous interactions between devices and users is challenging for several reasons: the wireless (and therefore invisible) nature of device communication, the heterogeneous nature of devices and lack of appropriate user interfaces in mobile devices, and the requirement for unobtrusive user interaction. The most promising approach that has been proposed...

    Provided By Lancaster University

  • White Papers // Jun 2012

    Non-Convex Mixed-Integer Nonlinear Programming: A Survey

    A wide range of problems arising in practical applications can be formulated as Mixed-Integer Non-Linear Programs (MINLPs). For the case in which the objective and constraint functions are convex, some quite effective exact and heuristic algorithms are available. When non-convexities are present, however, things become much more difficult, since then...

    Provided By Lancaster University

  • White Papers // Jun 2012

    Malware Detection in the Context of Cloud Computing

    Cloud computing is becoming an increasingly popular paradigm due to new services and increased media attention. This increase in popularity has lead to concerns over the security of the cloud, especially from threats such as malware. As more services migrate to a cloud architecture the cloud will become a more...

    Provided By Lancaster University

  • White Papers // Apr 2012

    Practical Network Coding in Sensor Networks: Quo Vadis?

    Network coding is a novel concept for improving network capacity. This additional capacity may be used to increase throughput or reliability. Also in wireless networks, network coding has been proposed as a method for improving communication. The authors present their experience from two studies of applying network coding in realistic...

    Provided By Lancaster University

  • White Papers // Jan 2012

    Sequential Monte Carlo Methods for Localisation in Wireless Networks

    Wireless indoor and outdoor localisation systems received a great deal of attention in recent years. This paper surveys first the current state-of-the-art of localisation techniques. Next, it formulates the problem of localisation within Bayesian framework and presents sequential Monte Carlo methods for localisation based on Received Signal Strength Indicators (RSSIs)....

    Provided By Lancaster University

  • White Papers // Jun 2011

    FDI In The Service Sector ? Propagator Of Growth For India?

    The last two decades have witnessed an unprecedented growth of the Indian service sector. This paper aims to analyze the growth dynamics of the FDI. It intends to see whether the growth in FDI has any significant impact on the service sector growth and also investigates whether a growth in...

    Provided By Lancaster University

  • White Papers // Jun 2011

    Enhanced Positioning Techniques for Hybrid Wireless Network

    This paper is to propose a reliable and accurate positioning method, which provides location estimates for the mobile user in heterogeneous wireless network (IEEE802.11/WiFi, IEEE802.16/ WiMAX and LTE technologies). The propose data fusion methodology utilises measurements and features such as Time Of Arrival (TOA) measurements and Multiple Input, Multiple Output...

    Provided By Lancaster University

  • White Papers // Jun 2011

    Towards Resilient Networks Using Situation Awareness

    Resilience will be an essential design and operational characteristic of future networks. This paper first surveys resilient networks and Situation Awareness (SA) in cyberspace. Then, SA is introduced in the detection module development of the authors' dynamic adaptation architecture that realizes the resilience control loop. Finally, a state transition model...

    Provided By Lancaster University

  • White Papers // May 2011

    WSN Evaluation in Industrial Environments First Results and Lessons Learned

    The GINSENG project develops performance-controlled wireless sensor networks that can be used for time-critical applications in hostile environments such as industrial plant automation and control. GINSENG aims at integrating wireless sensor networks with existing enterprise resource management solutions using a middleware. A cornerstone is the evaluation in a challenging industrial...

    Provided By Lancaster University

  • White Papers // May 2011

    Software for Schenkerian Analysis

    Software developed to automate the process of Schenkerian analysis is described. The current state of the art is that moderately good analyzes of small extracts can be generated, but more information is required about the criteria by which analysts make decisions among alter-native interpretations in the course of analysis. The...

    Provided By Lancaster University

  • White Papers // Apr 2011

    Securing Communication in 6LoWPAN With Compressed IPsec

    With the inception of IPv6 it is possible to assign a unique ID to each device on planet. Recently, wireless sensor networks and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Real-world deployments of WSN demand secure communication. The receiver should be able to verify that sensor...

    Provided By Lancaster University

  • White Papers // Apr 2011

    Reasoning About Faults in Aspect-Oriented Programs: A Metrics-Based Evaluation

    Aspect-Oriented Programming (AOP) aims at facilitating program comprehension and maintenance in the presence of crosscutting concerns. Aspect code is often introduced and extended as the software projects evolve. Unfortunately, the authors still lack a good understanding of how faults are introduced in evolving aspect-oriented programs. More importantly, there is little...

    Provided By Lancaster University

  • White Papers // Feb 2011

    A Collaborative AAA Architecture to Enable Secure Real-World Network Mobility

    Mobile Networks are emerging in the real world in various scenarios, from networks in public transportation to personal networks in consumer electronics. The NEMO BS protocol provides constant network connectivity and reachability for the nodes of these Mobile Networks in a seamless manner despite their roaming. However, NEMO BS has...

    Provided By Lancaster University

  • White Papers // Feb 2011

    6LoWPAN Extension for IPsec

    Real-world deployments of Wireless Sensor Networks (WSNs) require secure communication. Recently, WSNs and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Available IPv6 protocol stacks can use IPsec to secure data exchange. Thus, it is desirable to extend 6LoWPAN such that IPsec communication with IPv6 nodes is...

    Provided By Lancaster University

  • White Papers // Feb 2011

    On the Characterization of Network Traffic Dynamics

    Characterizing backbone networks poses a significant challenge due to the unstable and fluctuated behavior exhibited by network traffic dynamics. Modeling techniques developed for volume-based traffic profiling rely on the statistical assumptions of stationarity, Gaussianity and linearity, whose applicability has not been thoroughly investigated throughout past and recent work. The authors...

    Provided By Lancaster University

  • White Papers // Jan 2011

    The Role of Reflective Middleware in Supporting Flexible Security Policies

    Next generation middleware must support applications in the face of increasing diversity in interaction paradigms, end system types and network styles. Therefore, to secure applications, flexible security policies must be configured and indeed reconfigured at run-time. In this paper, the authors propose an approach combining the openness of reflective middleware...

    Provided By Lancaster University

  • White Papers // Dec 2010

    BurstProbe: Debugging Time-Critical Data Delivery in Wireless Sensor Networks

    In this paper the authors present BurstProbe, a new technique to accurately measure link burstiness in a wireless sensor network employed for time-critical data delivery. Measurement relies on shared probing slots that are embedded in the transmission schedule and used by nodes to assess link burstiness over time. The acquired...

    Provided By Lancaster University

  • White Papers // Dec 2010

    Towards a Secure and Seamless Host Mobility for the Real World

    Mobile IPv6 has been developed for quite a few years now, but it has yet to bring its constant connectivity and global reachability benefits to mobile devices in real world scenarios, mainly due to lack of trouble-free and secure network access and data transmission for devices as they roam. In...

    Provided By Lancaster University

  • White Papers // Nov 2010

    Vehicle-Driver Communication Using Off-The-Shelf Transceivers

    Almost all modern cars can be controlled remotely using a personal communicator (keyfob). However, the degree of interaction between currently available personal communicators and cars is very limited. The communication link is unidirectional and the communication range is limited to a few dozen meters. However, there are many interesting applications...

    Provided By Lancaster University

  • White Papers // Sep 2010

    Building Extensible Networks With Rule-Based Forwarding

    The authors present a network design that provides flexible and policy-compliant forwarding. The proposal centers around a new architectural concept: that of packet rules. A rule is a simple if-then-else construct that describes the manner in which the network should - or should not - forward packets. A packet identifies...

    Provided By Lancaster University

  • White Papers // Aug 2010

    The Influence Of Intuitive Expertise In Transforming Music Industry Relationships

    The music industry has been going through fundamental technology driven transformation altering its competitive structure. Up-to-date, intellectual property rights and new forms of music distribution have been the main focus of academic research. In this working paper, the authors examine another revolutionary change taking place in this industry. This concerns...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Interacted Service In Business Networks

    This paper builds on developments within IMP research and within the literature on Service Dominant Logic and advances the idea of interacted service in business networks. Interacted service involves specific and often multiple problem-coping by, for and between business actors. The paper discusses the value of the concept of interacted...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Signalling Sustainability Strategies: Preliminary Findings From Two Case Studies

    The purpose of this paper is to develop the understanding on how sustainability strategies emerge. Two case studies focusing on business groups from the cork and electrical equipment sectors are compared and contrasted in terms of their sustainability strategies. They argue that the formation of a holistic sustainability strategy is...

    Provided By Lancaster University

  • White Papers // Aug 2010

    The Use Of Capital In Networks

    The widespread use of leverage in business networks raises a series of questions about the companies' detrimental reliance on business networks to finance their operations. In this paper, the author addresses a gap in the knowledge of the use of capital in business networks by investigating the increasing levels of...

    Provided By Lancaster University

  • White Papers // Aug 2010

    The Practice Of Business Models

    This paper examines the concept of business models. Through the paper of secondary data from the recorded sound industry, the authors explore how business models change over time. The history of the recorded sound industry, from its birth in the 1870s shows how technologies, market offerings and the network architecture...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Market Shaping And Valuation In The Ugandan Coffee Market

    This paper project seeks to explain from a market practice perspective how the coffee market in Uganda is shaped, and draws from the works of ?aliskan and Callon (2009) and anthropology to investigate the pragmatics of economic valuation of Ugandan coffee. While much previous work on agri-food commodities has been...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Understanding The Impact Of Marketing - Purchasing Collaboration On Improving Firm Performance: An Empirical Study Of A Transitional Economy

    Improving business relationships in complex business networks requires at least two distinctive competences with regard to the marketing function of a firm. Firstly, the company needs to develop a deep understanding of its business partners, especially buyers. In order to best serve these customers in a mutually beneficial way, the...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Strategies for Network Resilience: Capitalising on Policies

    Networked systems is subject to a wide range of challenges whose nature changes over time, including malicious attacks and operational overload. Numerous mechanisms can be used to ensure the resilience of networked systems, but it can be difficult to define how these mechanisms should be configured in networks that support...

    Provided By Lancaster University

  • White Papers // Jul 2010

    Implementation and Evaluation of Distance-Based Message Authentication

    A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message transmission making it possible to authenticate messages based on distance. In this paper, the authors present a practical implementation of Distance Based Message Authentication (DBMA) for WSNs...

    Provided By Lancaster University

  • White Papers // Jun 2010

    On Improving Security of GPT Cryptosystems

    The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding. This enabled using public keys of a smaller size. Several attacks against this system were...

    Provided By Lancaster University

  • White Papers // Jun 2010

    GINSENG: Performance Control in Wireless Sensor Networks

    The goal of the GINSENG project is a performance-controlled sensor network suitable for applications with specific network performance requirements, such as plant automation and health monitoring. Any such sensor network must include a deterministic MAC protocol that can meet the application's targets in areas like delivery delays and reliability. The...

    Provided By Lancaster University

  • White Papers // May 2010

    Classification of Spontaneous Device Association From a Usability Perspective

    As computing devices become ubiquitous, devices are expected to encounter and associate with one another spontaneously to form ad hoc networks for sharing resources. One of the challenges in research remains in the task of making a device association scheme secure and, at the same time, easy to use. There...

    Provided By Lancaster University

  • White Papers // May 2010

    Identifying Legitimate Clients Under Distributed Denial-of-Service Attacks

    Distributed Denial of Service (DDoS) attacks are a persistent, current, and very real threat to networks. Expanding upon a flexible distributed framework for network remediation utilising multiple strategies, the authors examine a novel fusion of methods to maximise throughput from legitimate clients and minimise the impact from attackers. The basic...

    Provided By Lancaster University

  • White Papers // Apr 2010

    Time-Critical Data Delivery InWireless Sensor Networks

    A number of Wireless Sensor Network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmission. This paper shows how WSNs can be dimensioned, deployed and operated such that both reliable and timely data delivery is ensured while scarce...

    Provided By Lancaster University

  • White Papers // Apr 2010

    Time-Critical Data Delivery in Wireless Sensor Networks

    A number of Wireless Sensor Network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmission. This paper shows how WSNs can be dimensioned, deployed and operated such that both reliable and timely data delivery is ensured while scarce...

    Provided By Lancaster University

  • White Papers // Apr 2010

    Business Model As An Institution: The Case Of First Iranian Public Private Partnership In Healthcare Industry

    As a result of the author's first year PhD in Marketing Department Lancaster University, this paper proposal outlines a theoretical underpinning of new approach to study of business models concept by the means of Actor-Network theory. Reviewing the literature, and identifying different perspective in defining business models, the paper shows...

    Provided By Lancaster University

  • White Papers // Aug 2009

    MANETKit: Supporting the Dynamic Deployment and Reconfiguration of Ad-Hoc Routing Protocols

    The innate dynamicity and complexity of Mobile Ad-hoc NETworks (MANETs) has resulted in numerous ad-hoc routing protocols being proposed. Furthermore, numerous variants and hybrids continue to be reported in the literature. This diversity appears to be inherent to the field - it seems unlikely that there will ever be a...

    Provided By Lancaster University

  • White Papers // Oct 2009

    Show Your Hands: A Vision-Based Approach to User Identification for Interactive Surfaces

    User identification opens up new interaction possibilities on interactive surfaces. Yet, many current multi-touch systems only detect isolated touches and cannot identify users. This paper presents a low-cost, biometric method for user identification for vision-based interactive surfaces. To identify users, the authors extract characteristic contour features from a flat hand...

    Provided By Lancaster University

  • White Papers // Aug 2009

    Search+: A Resource Efficient Peer-to-Peer Service Discovery Mechanism

    A recent feasibility study suggests that a Service-Oriented Architecture (SOA) will be central within the NATO network enabled capabilities information infrastructure. An important element of a SOA is the service discovery process, but existing solutions are not sufficient in military networks. The authors suggest using a robust Peer-To-Peer (P2P) network...

    Provided By Lancaster University

  • White Papers // Oct 2009

    Touch-Display Keyboards and Their Integration With Graphical User Interfaces

    The authors introduce Touch-Display Keyboards (TDK) that retain the traditional physical key layout and in addition provide dynamic display and touch-sensing capability for each key. They demonstrate how TDKs can be seamlessly integrated with graphical user interfaces by extending the graphical output as well as three-state input across the keyboard's...

    Provided By Lancaster University

  • White Papers // Oct 2009

    An Interactive Table Supporting Mobile Phone Interaction and 3D Content

    Due to the small User Interfaces (UI) and screen displays of mobile phones it is inconvenient for multiple users to access and view content on phones simultaneously. As such, integrating multi-touch interactive tables with users' interactions with the content on their phones can be seen as one approach to augment...

    Provided By Lancaster University

  • White Papers // Sep 2009

    Revisiting the Relationship Between Software Architecture and Requirements: The Case of Dynamically Adaptive Systems

    This paper revisits the relationship between software architecture and requirements focusing on the case of self-adaptive systems. The authors present their view of the state-of-the-art, including their own work, on both areas and their contribution towards the development of self-adaptive systems. The authors support the claim that there is no...

    Provided By Lancaster University

  • White Papers // Jun 2009

    Fine Grained Component Based Engineering of Adaptive Overlays: Experiences and Perspectives

    Recent years have seen significant research being carried out into Peer-To-Peer (P2P) systems. This paper has focused on the styles and applications of P2P computing, from grid computation to content distribution; however, little investigation has been performed into how these systems are built. Component based engineering is an approach that...

    Provided By Lancaster University

  • White Papers // Mar 2009

    A Reflective Middleware to Support Peer-to-Peer Overlay Adaptation

    As peer-to-peer systems are evolving from simplistic application specific overlays to middleware platforms hosting a range of potential applications it has become evident that increasingly configurable approaches are required to ensure appropriate overlay support is provided for divergent applications. This is exacerbated by the increasing heterogeneity of networked devices expected...

    Provided By Lancaster University

  • White Papers // Mar 2009

    Combining Positioning and Communication Using UWB Transceivers

    A new generation of Ultra WideBand (UWB) communication transceivers are becoming available which support both positioning and communication tasks. Transceiver manufacturers envision that communication and positioning features are used separately. The authors believe that this is an unnecessary restriction of the available hardware and that positioning and communication tasks can...

    Provided By Lancaster University

  • White Papers // Jun 2009

    CONNECT Challenges: Towards Emergent Connectors for Eternal Networked Systems

    The CONNECT European project that started in February 2009 aims at dropping the interoperability barrier faced by today's distributed systems. It does so by adopting a revolutionary approach to the seamless networking of digital systems that are, synthesizing on the fly the connectors via which networked systems communicate. CONNECT then...

    Provided By Lancaster University

  • White Papers // Apr 2009

    Middleware Support for Dynamic Reconfiguration in Sensor Networks

    The operational environments of sensor networks will alter over time, often due to hazardous conditions or fluctuating resource availability; however this important characteristic of sensor networks has yet to be fully addressed by current middleware solutions. In this paper, the authors present a reflective middleware solution for co-ordinated dynamic reconfiguration...

    Provided By Lancaster University

  • White Papers // Mar 2009

    On the Feasibility of a New Defense Layer for Wireless Sensor Networks Using RF Ranging

    Cryptography is commonly used to provide link-layer message authentication in wireless sensor networks. However, keys are susceptible to compromise and introduce management requirements. Avoiding keys can therefore deliver security and management benefits. The paper introduces and discusses the feasibility of RTTMAP, a protocol that uses radio frequency ranging for message...

    Provided By Lancaster University

  • White Papers // Sep 2008

    Evaluating the Performance of Network Protocol Processing on Multi-Core Systems

    Improvements at the physical network layer have enabled technologies such as 10 Gigabit Ethernet. Single core end-systems are unable to fully utilise these networks, due to limited clock cycles. Using a multi-core architecture is one method which increases the number of available cycles, and thus allow networks to be fully...

    Provided By Lancaster University

  • White Papers // Mar 2009

    Providing Grid Schedulers With Passive Network Measurements

    Grids offer the potential to carry out difficult computing tasks and achieve superior aggregate performance through the utilization of remote resources and transparent collaboration between independent bodies (whether individuals or organizations). Grids are highly complex systems consisting of heterogeneous resources on disparate hosts interconnected across different Autonomous Systems and virtual...

    Provided By Lancaster University

  • White Papers // Jun 2009

    Implementation of a MAC Protocol for QoS Support in Wireless Sensor Networks

    Future application areas of Wireless Sensor Networks (WSNs) may include industrial process automation, aircraft control systems or patient monitoring in hospitals. Such applications require predictable quality of service in terms of message transfer delay and reliability. Performance of WSN data transport is to a large extent defined by the employed...

    Provided By Lancaster University

  • White Papers // Jun 2009

    Poster Abstract: Combining Positioning & Communication Using Ultra Wideband Transceivers

    A new generation of Ultra Wide Band (UWB) communication transceivers are becoming available that supports both positioning and communication tasks. Transceiver manufacturers envision that communication and positioning features are used separately and asymmetrically. The authors believe that this is an unnecessary restriction of the available hardware and that positioning and...

    Provided By Lancaster University

  • White Papers // Dec 2008

    Comparitive Study of Variability Management in Software Product Lines and Runtime Adaptable Systems

    Software Product Lines (SPL) and Runtime Adaptation (RTA) have traditionally been distinct research areas addressing different problems and with different communities. Despite the differences, there are also underlying commonalities with synergies that are worth investigating in both domains, potentially leading to more systematic variability support in both domains. Accordingly, this...

    Provided By Lancaster University

  • White Papers // Oct 2008

    Corelli: A Peer-to-Peer Dynamic Replication Service for Supporting Latency-Dependent Content in Community Networks

    The quality of service for latency dependent content, such as video streaming, largely depends on the distance and available bandwidth between the consumer and the content. Poor provision of these qualities results in reduced user experience and increased overhead. To alleviate this, many systems operate caching and replication, utilising dedicated...

    Provided By Lancaster University

  • White Papers // Jan 2009

    LA1 TestBed: Evaluation Testbed to Assess the Impact of Network Impairments on Video Quality

    Currently, a complete system for analyzing the effect of packet loss on a viewer's perception is not available. Given the popularity of digital video and the growing interest in live video streams where channel coding errors cannot be corrected, such a system would give great insight into the problem of...

    Provided By Lancaster University

  • White Papers // Feb 2009

    RELAX: Incorporating Uncertainty Into the Specification of Self-Adaptive Systems

    Self-adaptive systems have the capability to autonomously modify their behavior at run-time in response to changes in their environment. Self-adaptation is particularly necessary for applications that must run continuously, even under adverse conditions and changing requirements; sample domains include automotive systems, telecommunications, and environmental monitoring systems. While a few techniques...

    Provided By Lancaster University

  • White Papers // Jan 2010

    Poster Abstract: A MAC Protocol for Industrial Process Automation and Control

    Industrial process automation and control is a promising application domain of Wireless Sensor and Actuator Networks (WSAN). This type of application requires reliable and timely data delivery which is inherently difficult to achieve in wireless communication. In this paper, the authors present a MAC protocol for the aforementioned application domain....

    Provided By Lancaster University

  • White Papers // Jan 2010

    Poster Abstract: An Implementation of Distance-Based Message Authentication for WSNs

    Distance-Based Message Authentication (DBMA) provides an additional layer of access control and helps defend against key compromise and denial-of-service attacks on constrained nodes. The distance between sender and receiver is measured securely. Messages sent from outside a defined physical distance can be rejected early, protecting vulnerable higher layers. The authors...

    Provided By Lancaster University

  • White Papers // Jul 2010

    Implementation and Evaluation of Distance-Based Message Authentication

    A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message transmission making it possible to authenticate messages based on distance. In this paper, the authors present a practical implementation of Distance Based Message Authentication (DBMA) for WSNs...

    Provided By Lancaster University

  • White Papers // Oct 2009

    RELAX: A Language to Address Uncertainty in Self-Adaptive Systems Requirements

    Self-adaptive systems have the capability to autonomously modify their behavior at run-time in response to changes in their environment. Self-adaptation is particularly necessary for applications that must run continuously, even under adverse conditions and changing requirements; sample domains include automotive systems, telecommunications, and environmental monitoring systems. While a few techniques...

    Provided By Lancaster University

  • White Papers // Jun 2011

    FDI In The Service Sector ? Propagator Of Growth For India?

    The last two decades have witnessed an unprecedented growth of the Indian service sector. This paper aims to analyze the growth dynamics of the FDI. It intends to see whether the growth in FDI has any significant impact on the service sector growth and also investigates whether a growth in...

    Provided By Lancaster University

  • White Papers // Mar 2009

    Unsupervised Two-Class & Multi-Class Support Vector Machines for Abnormal Traffic Characterization

    Although measurement-based real-time traffic classification has received considerable research attention, the timing constraints imposed by the high accuracy requirements and the learning phase of the algorithms employed still remain a challenge. In this paper the authors propose a measurement-based classification framework that exploits unsupervised learning to accurately categorise network anomalies...

    Provided By Lancaster University

  • White Papers // Jul 2009

    A Study on Transmission Delay With Finite Coding Length in Wireless Cooperative Networks

    In this paper, the authors consider the problem of transmission delay in terms of finite coding length derived from the random coding bound for different cooperative protocols. Specifically, they first study the impact of cooperative transmission on the routing decision for wireless ad-hoc networks, where a routing optimization problem is...

    Provided By Lancaster University

  • White Papers // Apr 2009

    Interference Subtraction With Supplementary Cooperation in Wireless Cooperative Networks

    In wireless networks, the broadcast nature of wireless transmission enables cooperation by sharing the same transmissions with nearby receivers and thus can help improve spatial reuse and boost network throughput along a multi-hop routing. The performance of wireless networks can be further improved if prior information available at the receivers...

    Provided By Lancaster University

  • White Papers // Sep 2009

    Transmission Capacity of Decode-and-Forward Cooperation in Overlaid Wireless Networks

    In this paper, the authors employ a stochastic geometry model to analyze the transmission capacity of the Decode-And-Forward (DAF) cooperation scheme in an overlaid wireless network where a PRimary (PR) network and a SecondaRy (SR) network coexist together. The PR users employ DAF scheme and have a higher priority to...

    Provided By Lancaster University

  • White Papers // Sep 2008

    Distributed and Power Efficient Routing in Wireless Cooperative Networks

    Most ad hoc mobile devices in wireless networks operate on batteries and power consumption is, therefore, an important issue for wireless network design. In this paper, the authors propose and investigate a new distributed cooperative routing algorithm that realizes minimum power transmission for each composed cooperative link, given the link...

    Provided By Lancaster University

  • White Papers // Jan 2009

    Application of Joint Source-Relay Scheduling to Cooperative Multiple Access Channels

    In this paper, the authors propose a novel spectrally efficient cooperative transmission protocol for multiple access scenarios. Different to some existing cooperative multiple access schemes, the proposed scheme can exploit the availability of relays as an extra dimension to increase reception robustness. By carefully scheduling the multiple sources and relays'...

    Provided By Lancaster University

  • White Papers // Jul 2009

    Compressing MAC Headers on Shared Wireless Media

    This paper presents a header compression algorithm that unlike previous protocols is capable of compressing MAC headers in a multiple-access (shared) channel. Previous schemes could not compress MAC headers because the address fields are needed to identify the in-tended destination as well as the intended context space under which compressed...

    Provided By Lancaster University

  • White Papers // Feb 2011

    A Collaborative AAA Architecture to Enable Secure Real-World Network Mobility

    Mobile Networks are emerging in the real world in various scenarios, from networks in public transportation to personal networks in consumer electronics. The NEMO BS protocol provides constant network connectivity and reachability for the nodes of these Mobile Networks in a seamless manner despite their roaming. However, NEMO BS has...

    Provided By Lancaster University

  • White Papers // May 2011

    WSN Evaluation in Industrial Environments First Results and Lessons Learned

    The GINSENG project develops performance-controlled wireless sensor networks that can be used for time-critical applications in hostile environments such as industrial plant automation and control. GINSENG aims at integrating wireless sensor networks with existing enterprise resource management solutions using a middleware. A cornerstone is the evaluation in a challenging industrial...

    Provided By Lancaster University

  • White Papers // Dec 2010

    BurstProbe: Debugging Time-Critical Data Delivery in Wireless Sensor Networks

    In this paper the authors present BurstProbe, a new technique to accurately measure link burstiness in a wireless sensor network employed for time-critical data delivery. Measurement relies on shared probing slots that are embedded in the transmission schedule and used by nodes to assess link burstiness over time. The acquired...

    Provided By Lancaster University

  • White Papers // Apr 2010

    Time-Critical Data Delivery InWireless Sensor Networks

    A number of Wireless Sensor Network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmission. This paper shows how WSNs can be dimensioned, deployed and operated such that both reliable and timely data delivery is ensured while scarce...

    Provided By Lancaster University

  • White Papers // Sep 2010

    Building Extensible Networks With Rule-Based Forwarding

    The authors present a network design that provides flexible and policy-compliant forwarding. The proposal centers around a new architectural concept: that of packet rules. A rule is a simple if-then-else construct that describes the manner in which the network should - or should not - forward packets. A packet identifies...

    Provided By Lancaster University

  • White Papers // Mar 2009

    Retransmission and Backoff Strategies for Wireless Broadcasting

    This paper defines a wireless broadcasting algorithm as having two components: a retransmission strategy and a backoff strategy. Several strategies are proposed in this paper and a comparative analysis is presented between existing algorithms and the strategies proposed herein. Simulation experiments and analysis are used to study or demonstrate the...

    Provided By Lancaster University

  • White Papers // Jan 2010

    Evaluating Xen for Router Virtualization

    In this paper, the performance of a software IP router forwarding plane inside the Xen virtual machine monitor environment is evaluated with a view to identifying (some) design issues in Virtual Routers. Even with minimal sized packets, the Xen Dom0 privileged domain offers near native forwarding performance at the condition...

    Provided By Lancaster University

  • White Papers // Jul 2009

    Network Virtualization Architecture: Proposal and Initial Prototype

    The tussle between reliability and functionality of the Internet is firmly biased on the side of reliability. New enabling technologies fail to achieve traction across the majority of ISPs. It is believed that the greatest challenge is not in finding solutions and improvements to the Internet's many problems, but in...

    Provided By Lancaster University