Lancaster University

Displaying 1-40 of 111 results

  • White Papers // May 2013

    Experiences of Using a Hybrid Cloud to Construct an Environmental Virtual Observatory

    Environmental science is often fragmented: data is collected using mismatched formats and conventions, and models are misaligned and run in isolation. Cloud computing offers a lot of potential in the way of resolving such issues by supporting data from different sources and at various scales, by facilitating the integration of...

    Provided By Lancaster University

  • White Papers // Nov 2012

    Service-Centric Networking Extensions

    This paper discusses several issues of Service-Centric Networking (SCN) as an extension of the Information-Centric Networking (ICN) paradigm. SCN allows extended caching, where not exactly the same content as requested can be read from caches, but similar content can be used to produce the content requested, e.g., by filtering or...

    Provided By Lancaster University

  • White Papers // Nov 2012

    Evaluation of the Socio-Economic Implications of Contractual Mobility in Roaming Architectures

    The European market for roaming services has historically experienced poor or no competition and, when competition has occurred, prices have been largely resistant to its downward pressure. The root cause of this failure lies in the technical limitations of the existing roaming architecture. An architecture able to remove these limitations...

    Provided By Lancaster University

  • White Papers // Nov 2012

    Interaction-Oriented Software Engineering: Concepts and Principles

    Following established tradition, software engineering today is rooted in a conceptually centralized way of thinking. The primary SE artifact is a specification of a machine - a computational artifact - that would meet the (elicited and) stated requirements. Therein lies a fundamental mismatch with (open) sociotechnical systems, which involve multiple...

    Provided By Lancaster University

  • White Papers // Jul 2012

    UACAP: A Unified Auxiliary Channel Authentication Protocol

    Authenticating spontaneous interactions between devices and users is challenging for several reasons: the wireless (and therefore invisible) nature of device communication, the heterogeneous nature of devices and lack of appropriate user interfaces in mobile devices, and the requirement for unobtrusive user interaction. The most promising approach that has been proposed...

    Provided By Lancaster University

  • White Papers // Jun 2012

    Non-Convex Mixed-Integer Nonlinear Programming: A Survey

    A wide range of problems arising in practical applications can be formulated as Mixed-Integer Non-Linear Programs (MINLPs). For the case in which the objective and constraint functions are convex, some quite effective exact and heuristic algorithms are available. When non-convexities are present, however, things become much more difficult, since then...

    Provided By Lancaster University

  • White Papers // Jun 2012

    Malware Detection in the Context of Cloud Computing

    Cloud computing is becoming an increasingly popular paradigm due to new services and increased media attention. This increase in popularity has lead to concerns over the security of the cloud, especially from threats such as malware. As more services migrate to a cloud architecture the cloud will become a more...

    Provided By Lancaster University

  • White Papers // Apr 2012

    Practical Network Coding in Sensor Networks: Quo Vadis?

    Network coding is a novel concept for improving network capacity. This additional capacity may be used to increase throughput or reliability. Also in wireless networks, network coding has been proposed as a method for improving communication. The authors present their experience from two studies of applying network coding in realistic...

    Provided By Lancaster University

  • White Papers // Jan 2012

    Sequential Monte Carlo Methods for Localisation in Wireless Networks

    Wireless indoor and outdoor localisation systems received a great deal of attention in recent years. This paper surveys first the current state-of-the-art of localisation techniques. Next, it formulates the problem of localisation within Bayesian framework and presents sequential Monte Carlo methods for localisation based on Received Signal Strength Indicators (RSSIs)....

    Provided By Lancaster University

  • White Papers // Jun 2011

    FDI In The Service Sector ? Propagator Of Growth For India?

    The last two decades have witnessed an unprecedented growth of the Indian service sector. This paper aims to analyze the growth dynamics of the FDI. It intends to see whether the growth in FDI has any significant impact on the service sector growth and also investigates whether a growth in...

    Provided By Lancaster University

  • White Papers // Jun 2011

    Enhanced Positioning Techniques for Hybrid Wireless Network

    This paper is to propose a reliable and accurate positioning method, which provides location estimates for the mobile user in heterogeneous wireless network (IEEE802.11/WiFi, IEEE802.16/ WiMAX and LTE technologies). The propose data fusion methodology utilises measurements and features such as Time Of Arrival (TOA) measurements and Multiple Input, Multiple Output...

    Provided By Lancaster University

  • White Papers // Jun 2011

    Towards Resilient Networks Using Situation Awareness

    Resilience will be an essential design and operational characteristic of future networks. This paper first surveys resilient networks and Situation Awareness (SA) in cyberspace. Then, SA is introduced in the detection module development of the authors' dynamic adaptation architecture that realizes the resilience control loop. Finally, a state transition model...

    Provided By Lancaster University

  • White Papers // May 2011

    WSN Evaluation in Industrial Environments First Results and Lessons Learned

    The GINSENG project develops performance-controlled wireless sensor networks that can be used for time-critical applications in hostile environments such as industrial plant automation and control. GINSENG aims at integrating wireless sensor networks with existing enterprise resource management solutions using a middleware. A cornerstone is the evaluation in a challenging industrial...

    Provided By Lancaster University

  • White Papers // May 2011

    Software for Schenkerian Analysis

    Software developed to automate the process of Schenkerian analysis is described. The current state of the art is that moderately good analyzes of small extracts can be generated, but more information is required about the criteria by which analysts make decisions among alter-native interpretations in the course of analysis. The...

    Provided By Lancaster University

  • White Papers // Apr 2011

    Securing Communication in 6LoWPAN With Compressed IPsec

    With the inception of IPv6 it is possible to assign a unique ID to each device on planet. Recently, wireless sensor networks and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Real-world deployments of WSN demand secure communication. The receiver should be able to verify that sensor...

    Provided By Lancaster University

  • White Papers // Apr 2011

    Reasoning About Faults in Aspect-Oriented Programs: A Metrics-Based Evaluation

    Aspect-Oriented Programming (AOP) aims at facilitating program comprehension and maintenance in the presence of crosscutting concerns. Aspect code is often introduced and extended as the software projects evolve. Unfortunately, the authors still lack a good understanding of how faults are introduced in evolving aspect-oriented programs. More importantly, there is little...

    Provided By Lancaster University

  • White Papers // Feb 2011

    A Collaborative AAA Architecture to Enable Secure Real-World Network Mobility

    Mobile Networks are emerging in the real world in various scenarios, from networks in public transportation to personal networks in consumer electronics. The NEMO BS protocol provides constant network connectivity and reachability for the nodes of these Mobile Networks in a seamless manner despite their roaming. However, NEMO BS has...

    Provided By Lancaster University

  • White Papers // Feb 2011

    6LoWPAN Extension for IPsec

    Real-world deployments of Wireless Sensor Networks (WSNs) require secure communication. Recently, WSNs and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Available IPv6 protocol stacks can use IPsec to secure data exchange. Thus, it is desirable to extend 6LoWPAN such that IPsec communication with IPv6 nodes is...

    Provided By Lancaster University

  • White Papers // Feb 2011

    On the Characterization of Network Traffic Dynamics

    Characterizing backbone networks poses a significant challenge due to the unstable and fluctuated behavior exhibited by network traffic dynamics. Modeling techniques developed for volume-based traffic profiling rely on the statistical assumptions of stationarity, Gaussianity and linearity, whose applicability has not been thoroughly investigated throughout past and recent work. The authors...

    Provided By Lancaster University

  • White Papers // Jan 2011

    The Role of Reflective Middleware in Supporting Flexible Security Policies

    Next generation middleware must support applications in the face of increasing diversity in interaction paradigms, end system types and network styles. Therefore, to secure applications, flexible security policies must be configured and indeed reconfigured at run-time. In this paper, the authors propose an approach combining the openness of reflective middleware...

    Provided By Lancaster University

  • White Papers // Dec 2010

    BurstProbe: Debugging Time-Critical Data Delivery in Wireless Sensor Networks

    In this paper the authors present BurstProbe, a new technique to accurately measure link burstiness in a wireless sensor network employed for time-critical data delivery. Measurement relies on shared probing slots that are embedded in the transmission schedule and used by nodes to assess link burstiness over time. The acquired...

    Provided By Lancaster University

  • White Papers // Dec 2010

    Towards a Secure and Seamless Host Mobility for the Real World

    Mobile IPv6 has been developed for quite a few years now, but it has yet to bring its constant connectivity and global reachability benefits to mobile devices in real world scenarios, mainly due to lack of trouble-free and secure network access and data transmission for devices as they roam. In...

    Provided By Lancaster University

  • White Papers // Nov 2010

    Vehicle-Driver Communication Using Off-The-Shelf Transceivers

    Almost all modern cars can be controlled remotely using a personal communicator (keyfob). However, the degree of interaction between currently available personal communicators and cars is very limited. The communication link is unidirectional and the communication range is limited to a few dozen meters. However, there are many interesting applications...

    Provided By Lancaster University

  • White Papers // Sep 2010

    Building Extensible Networks With Rule-Based Forwarding

    The authors present a network design that provides flexible and policy-compliant forwarding. The proposal centers around a new architectural concept: that of packet rules. A rule is a simple if-then-else construct that describes the manner in which the network should - or should not - forward packets. A packet identifies...

    Provided By Lancaster University

  • White Papers // Aug 2010

    The Influence Of Intuitive Expertise In Transforming Music Industry Relationships

    The music industry has been going through fundamental technology driven transformation altering its competitive structure. Up-to-date, intellectual property rights and new forms of music distribution have been the main focus of academic research. In this working paper, the authors examine another revolutionary change taking place in this industry. This concerns...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Interacted Service In Business Networks

    This paper builds on developments within IMP research and within the literature on Service Dominant Logic and advances the idea of interacted service in business networks. Interacted service involves specific and often multiple problem-coping by, for and between business actors. The paper discusses the value of the concept of interacted...

    Provided By Lancaster University

  • White Papers // Aug 2010

    The Use Of Capital In Networks

    The widespread use of leverage in business networks raises a series of questions about the companies' detrimental reliance on business networks to finance their operations. In this paper, the author addresses a gap in the knowledge of the use of capital in business networks by investigating the increasing levels of...

    Provided By Lancaster University

  • White Papers // Aug 2010

    The Practice Of Business Models

    This paper examines the concept of business models. Through the paper of secondary data from the recorded sound industry, the authors explore how business models change over time. The history of the recorded sound industry, from its birth in the 1870s shows how technologies, market offerings and the network architecture...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Signalling Sustainability Strategies: Preliminary Findings From Two Case Studies

    The purpose of this paper is to develop the understanding on how sustainability strategies emerge. Two case studies focusing on business groups from the cork and electrical equipment sectors are compared and contrasted in terms of their sustainability strategies. They argue that the formation of a holistic sustainability strategy is...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Market Shaping And Valuation In The Ugandan Coffee Market

    This paper project seeks to explain from a market practice perspective how the coffee market in Uganda is shaped, and draws from the works of ?aliskan and Callon (2009) and anthropology to investigate the pragmatics of economic valuation of Ugandan coffee. While much previous work on agri-food commodities has been...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Understanding The Impact Of Marketing - Purchasing Collaboration On Improving Firm Performance: An Empirical Study Of A Transitional Economy

    Improving business relationships in complex business networks requires at least two distinctive competences with regard to the marketing function of a firm. Firstly, the company needs to develop a deep understanding of its business partners, especially buyers. In order to best serve these customers in a mutually beneficial way, the...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Strategies for Network Resilience: Capitalising on Policies

    Networked systems is subject to a wide range of challenges whose nature changes over time, including malicious attacks and operational overload. Numerous mechanisms can be used to ensure the resilience of networked systems, but it can be difficult to define how these mechanisms should be configured in networks that support...

    Provided By Lancaster University

  • White Papers // Jul 2010

    Implementation and Evaluation of Distance-Based Message Authentication

    A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message transmission making it possible to authenticate messages based on distance. In this paper, the authors present a practical implementation of Distance Based Message Authentication (DBMA) for WSNs...

    Provided By Lancaster University

  • White Papers // Jun 2010

    GINSENG: Performance Control in Wireless Sensor Networks

    The goal of the GINSENG project is a performance-controlled sensor network suitable for applications with specific network performance requirements, such as plant automation and health monitoring. Any such sensor network must include a deterministic MAC protocol that can meet the application's targets in areas like delivery delays and reliability. The...

    Provided By Lancaster University

  • White Papers // Jun 2010

    On Improving Security of GPT Cryptosystems

    The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding. This enabled using public keys of a smaller size. Several attacks against this system were...

    Provided By Lancaster University

  • White Papers // May 2010

    Classification of Spontaneous Device Association From a Usability Perspective

    As computing devices become ubiquitous, devices are expected to encounter and associate with one another spontaneously to form ad hoc networks for sharing resources. One of the challenges in research remains in the task of making a device association scheme secure and, at the same time, easy to use. There...

    Provided By Lancaster University

  • White Papers // May 2010

    Identifying Legitimate Clients Under Distributed Denial-of-Service Attacks

    Distributed Denial of Service (DDoS) attacks are a persistent, current, and very real threat to networks. Expanding upon a flexible distributed framework for network remediation utilising multiple strategies, the authors examine a novel fusion of methods to maximise throughput from legitimate clients and minimise the impact from attackers. The basic...

    Provided By Lancaster University

  • White Papers // Apr 2010

    Time-Critical Data Delivery in Wireless Sensor Networks

    A number of Wireless Sensor Network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmission. This paper shows how WSNs can be dimensioned, deployed and operated such that both reliable and timely data delivery is ensured while scarce...

    Provided By Lancaster University

  • White Papers // Apr 2010

    Time-Critical Data Delivery InWireless Sensor Networks

    A number of Wireless Sensor Network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmission. This paper shows how WSNs can be dimensioned, deployed and operated such that both reliable and timely data delivery is ensured while scarce...

    Provided By Lancaster University

  • White Papers // Apr 2010

    Business Model As An Institution: The Case Of First Iranian Public Private Partnership In Healthcare Industry

    As a result of the author's first year PhD in Marketing Department Lancaster University, this paper proposal outlines a theoretical underpinning of new approach to study of business models concept by the means of Actor-Network theory. Reviewing the literature, and identifying different perspective in defining business models, the paper shows...

    Provided By Lancaster University

  • White Papers // Aug 2010

    The Use Of Capital In Networks

    The widespread use of leverage in business networks raises a series of questions about the companies' detrimental reliance on business networks to finance their operations. In this paper, the author addresses a gap in the knowledge of the use of capital in business networks by investigating the increasing levels of...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Market Shaping And Valuation In The Ugandan Coffee Market

    This paper project seeks to explain from a market practice perspective how the coffee market in Uganda is shaped, and draws from the works of ?aliskan and Callon (2009) and anthropology to investigate the pragmatics of economic valuation of Ugandan coffee. While much previous work on agri-food commodities has been...

    Provided By Lancaster University

  • White Papers // Aug 2010

    The Practice Of Business Models

    This paper examines the concept of business models. Through the paper of secondary data from the recorded sound industry, the authors explore how business models change over time. The history of the recorded sound industry, from its birth in the 1870s shows how technologies, market offerings and the network architecture...

    Provided By Lancaster University

  • White Papers // Aug 2010

    The Influence Of Intuitive Expertise In Transforming Music Industry Relationships

    The music industry has been going through fundamental technology driven transformation altering its competitive structure. Up-to-date, intellectual property rights and new forms of music distribution have been the main focus of academic research. In this working paper, the authors examine another revolutionary change taking place in this industry. This concerns...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Understanding The Impact Of Marketing - Purchasing Collaboration On Improving Firm Performance: An Empirical Study Of A Transitional Economy

    Improving business relationships in complex business networks requires at least two distinctive competences with regard to the marketing function of a firm. Firstly, the company needs to develop a deep understanding of its business partners, especially buyers. In order to best serve these customers in a mutually beneficial way, the...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Interacted Service In Business Networks

    This paper builds on developments within IMP research and within the literature on Service Dominant Logic and advances the idea of interacted service in business networks. Interacted service involves specific and often multiple problem-coping by, for and between business actors. The paper discusses the value of the concept of interacted...

    Provided By Lancaster University

  • White Papers // Sep 2009

    Novating Knowledge In Business Networks: Facilitating Cognitive Consistency In The Construction Industry

    Loose couplings within a network are thought to inhibit learning and innovation as evidenced in the construction industry characterised by its loose couplings in the permanent network and tight (but albeit short-lived) couplings at the level of individual projects. In this paper, the authors explore the practice of novation, a...

    Provided By Lancaster University

  • White Papers // Sep 2009

    Is Market Orientation Driving Relational Capabilities Development? The Case Of Russian Industrial Firms

    The paper investigates the role of market orientation as a driver of the development of relational capabilities in Russian firms. The paper tests the role of market orientation not only as a driver of business performance, but mainly as a platform for the creation and enhancement of a firm's embeddedness...

    Provided By Lancaster University

  • White Papers // Sep 2009

    Efficiency-Seeking Or Recipe-Following? The Case Of Outsourcing

    This paper examines outsourcing as a contemporary example of "Best practice" to examine the relationship between historical narratives, managerial actions and management theories. The authors argue mangers are neither ruthless efficiency seekers, as Chandlerian business history would have them believe, nor blind followers of fads and fashions as proposed by...

    Provided By Lancaster University

  • White Papers // Jan 2011

    The Role of Reflective Middleware in Supporting Flexible Security Policies

    Next generation middleware must support applications in the face of increasing diversity in interaction paradigms, end system types and network styles. Therefore, to secure applications, flexible security policies must be configured and indeed reconfigured at run-time. In this paper, the authors propose an approach combining the openness of reflective middleware...

    Provided By Lancaster University

  • White Papers // Nov 2008

    Collect&Drop: A Technique for Multi-Tag Interaction With Real World Objects and Information

    The advancement of Ubicomp technologies leverages mobile interaction with physical objects and facilitates ubiquitous access to information and services. This provides new opportunities for mobile interaction with the real world, but also creates new challenges regarding the complexity of mobile applications, their interaction design and usability. In order to take...

    Provided By Lancaster University

  • White Papers // Aug 2008

    Specifying and Constructing a Fault-Tolerant Composite Service

    This paper proposes a means to specify the semantics of fault tolerant web services at an abstract level using semantics adapted from queuing system theory. A framework that supports the implementation of specified fault-tolerance is also described. Based on the paper, the authors show how the redundancy and diversity characteristics...

    Provided By Lancaster University

  • White Papers // Oct 2008

    The Measurement and Modeling of a P2P Streaming Video Service

    Most of the work on grid technology in the video area has been generally restricted to aspects of resource scheduling and replica management. The traffic of such a service has a lot of characteristics in common with that of the traditional video service. However, the architecture and user behavior in...

    Provided By Lancaster University

  • White Papers // Jul 2008

    Juno: Reconfigurable Middleware for Heterogeneous Content Networking

    Multimedia content distribution is playing an increasingly prominent role in the internet today, with a proliferation of diverse services and delivery mechanisms. Due to this increasing heterogeneity the management of next generation content networks is becoming increasingly complex. This paper presents Juno, a configurable component-based middleware designed to address the...

    Provided By Lancaster University

  • White Papers // Oct 2008

    Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks

    A suitable strategy for network intrusion tolerance - detecting intrusions and remedying them - depends on aspects of the domain being protected, such as the kinds of intrusion faced, the resources available for monitoring and remediation, and the level at which automated remediation can be carried out. The decision to...

    Provided By Lancaster University

  • White Papers // Aug 2009

    A Semantic Composition Model to Preserve (Re) Configuration Consistency in Aspect Oriented Middleware

    Aspect-oriented programming enables the isolation and modularisation of crosscutting concerns that are typically implemented in a tangled fashion within the base system. However, the composition of these aspects is not completely orthogonal; with interactions between aspects involving direct and indirect dependencies, and conflicts that can cause run-time inconsistencies when those...

    Provided By Lancaster University

  • White Papers // Aug 2009

    MANETKit: Supporting the Dynamic Deployment and Reconfiguration of Ad-Hoc Routing Protocols

    The innate dynamicity and complexity of Mobile Ad-hoc NETworks (MANETs) has resulted in numerous ad-hoc routing protocols being proposed. Furthermore, numerous variants and hybrids continue to be reported in the literature. This diversity appears to be inherent to the field - it seems unlikely that there will ever be a...

    Provided By Lancaster University

  • White Papers // Oct 2009

    Show Your Hands: A Vision-Based Approach to User Identification for Interactive Surfaces

    User identification opens up new interaction possibilities on interactive surfaces. Yet, many current multi-touch systems only detect isolated touches and cannot identify users. This paper presents a low-cost, biometric method for user identification for vision-based interactive surfaces. To identify users, the authors extract characteristic contour features from a flat hand...

    Provided By Lancaster University

  • White Papers // Aug 2009

    Search+: A Resource Efficient Peer-to-Peer Service Discovery Mechanism

    A recent feasibility study suggests that a Service-Oriented Architecture (SOA) will be central within the NATO network enabled capabilities information infrastructure. An important element of a SOA is the service discovery process, but existing solutions are not sufficient in military networks. The authors suggest using a robust Peer-To-Peer (P2P) network...

    Provided By Lancaster University

  • White Papers // Apr 2010

    Time-Critical Data Delivery in Wireless Sensor Networks

    A number of Wireless Sensor Network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmission. This paper shows how WSNs can be dimensioned, deployed and operated such that both reliable and timely data delivery is ensured while scarce...

    Provided By Lancaster University

  • White Papers // May 2010

    Identifying Legitimate Clients Under Distributed Denial-of-Service Attacks

    Distributed Denial of Service (DDoS) attacks are a persistent, current, and very real threat to networks. Expanding upon a flexible distributed framework for network remediation utilising multiple strategies, the authors examine a novel fusion of methods to maximise throughput from legitimate clients and minimise the impact from attackers. The basic...

    Provided By Lancaster University

  • White Papers // May 2010

    Classification of Spontaneous Device Association From a Usability Perspective

    As computing devices become ubiquitous, devices are expected to encounter and associate with one another spontaneously to form ad hoc networks for sharing resources. One of the challenges in research remains in the task of making a device association scheme secure and, at the same time, easy to use. There...

    Provided By Lancaster University

  • White Papers // Mar 2010

    Improving Wireless Sensor Network Resilience With the INTERSECTION Framework

    This paper investigates the INTERSECTION framework's ability to build resilience into wireless sensor networks. The framework's general details are examined along with general approaches to protection against misbehaving WSN nodes. Three different approaches to remediation were implemented and tested on a TinyOS network for their different operating characteristics. Many aspects...

    Provided By Lancaster University

  • White Papers // Jan 2010

    Requirements Reflection: Requirements as Runtime Entities

    Computational reflection is a well-established technique that gives a program the ability to dynamically observe and possibly modify its behavior. To date, however, reflection is mainly applied either to the software architecture or its implementation. The authors know of no approach that fully supports requirements reflection - that is, making...

    Provided By Lancaster University

  • White Papers // Mar 2010

    A Comparison of Static and Dynamic Component Models for Wireless Sensor Networks

    In this paper, the authors provide a detailed discussion and evaluation of the theoretical and practical differences between static and dynamic component models as the foundations of programming wireless sensor nodes. As the static benchmark they examine the nesC component model underpinning TinyOS; and as the dynamic benchmark they examine...

    Provided By Lancaster University

  • White Papers // Jan 2010

    Preserving Dynamic Reconfiguration Consistency in Aspect Oriented Middleware

    Aspect-oriented middleware is a promising technology for the realisation of dynamic reconfiguration in heterogeneous distributed systems. However, like other dynamic reconfiguration approaches, AO-middleware-based reconfiguration requires that the consistency of the system is maintained across reconfigurations. AO-middleware-based reconfiguration is an ongoing research topic and several consistency approaches have been proposed. However,...

    Provided By Lancaster University

  • White Papers // Jan 2010

    Poster Abstract: A MAC Protocol for Industrial Process Automation and Control

    Industrial process automation and control is a promising application domain of Wireless Sensor and Actuator Networks (WSAN). This type of application requires reliable and timely data delivery which is inherently difficult to achieve in wireless communication. In this paper, the authors present a MAC protocol for the aforementioned application domain....

    Provided By Lancaster University

  • White Papers // Jan 2010

    Poster Abstract: An Implementation of Distance-Based Message Authentication for WSNs

    Distance-Based Message Authentication (DBMA) provides an additional layer of access control and helps defend against key compromise and denial-of-service attacks on constrained nodes. The distance between sender and receiver is measured securely. Messages sent from outside a defined physical distance can be rejected early, protecting vulnerable higher layers. The authors...

    Provided By Lancaster University

  • White Papers // Jul 2010

    Implementation and Evaluation of Distance-Based Message Authentication

    A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message transmission making it possible to authenticate messages based on distance. In this paper, the authors present a practical implementation of Distance Based Message Authentication (DBMA) for WSNs...

    Provided By Lancaster University

  • White Papers // Oct 2009

    RELAX: A Language to Address Uncertainty in Self-Adaptive Systems Requirements

    Self-adaptive systems have the capability to autonomously modify their behavior at run-time in response to changes in their environment. Self-adaptation is particularly necessary for applications that must run continuously, even under adverse conditions and changing requirements; sample domains include automotive systems, telecommunications, and environmental monitoring systems. While a few techniques...

    Provided By Lancaster University

  • White Papers // Jun 2011

    FDI In The Service Sector ? Propagator Of Growth For India?

    The last two decades have witnessed an unprecedented growth of the Indian service sector. This paper aims to analyze the growth dynamics of the FDI. It intends to see whether the growth in FDI has any significant impact on the service sector growth and also investigates whether a growth in...

    Provided By Lancaster University

  • White Papers // Mar 2009

    Unsupervised Two-Class & Multi-Class Support Vector Machines for Abnormal Traffic Characterization

    Although measurement-based real-time traffic classification has received considerable research attention, the timing constraints imposed by the high accuracy requirements and the learning phase of the algorithms employed still remain a challenge. In this paper the authors propose a measurement-based classification framework that exploits unsupervised learning to accurately categorise network anomalies...

    Provided By Lancaster University

  • White Papers // Jul 2009

    A Study on Transmission Delay With Finite Coding Length in Wireless Cooperative Networks

    In this paper, the authors consider the problem of transmission delay in terms of finite coding length derived from the random coding bound for different cooperative protocols. Specifically, they first study the impact of cooperative transmission on the routing decision for wireless ad-hoc networks, where a routing optimization problem is...

    Provided By Lancaster University

  • White Papers // Apr 2009

    Interference Subtraction With Supplementary Cooperation in Wireless Cooperative Networks

    In wireless networks, the broadcast nature of wireless transmission enables cooperation by sharing the same transmissions with nearby receivers and thus can help improve spatial reuse and boost network throughput along a multi-hop routing. The performance of wireless networks can be further improved if prior information available at the receivers...

    Provided By Lancaster University

  • White Papers // Sep 2009

    Transmission Capacity of Decode-and-Forward Cooperation in Overlaid Wireless Networks

    In this paper, the authors employ a stochastic geometry model to analyze the transmission capacity of the Decode-And-Forward (DAF) cooperation scheme in an overlaid wireless network where a PRimary (PR) network and a SecondaRy (SR) network coexist together. The PR users employ DAF scheme and have a higher priority to...

    Provided By Lancaster University

  • White Papers // Sep 2008

    Distributed and Power Efficient Routing in Wireless Cooperative Networks

    Most ad hoc mobile devices in wireless networks operate on batteries and power consumption is, therefore, an important issue for wireless network design. In this paper, the authors propose and investigate a new distributed cooperative routing algorithm that realizes minimum power transmission for each composed cooperative link, given the link...

    Provided By Lancaster University

  • White Papers // Jan 2009

    Application of Joint Source-Relay Scheduling to Cooperative Multiple Access Channels

    In this paper, the authors propose a novel spectrally efficient cooperative transmission protocol for multiple access scenarios. Different to some existing cooperative multiple access schemes, the proposed scheme can exploit the availability of relays as an extra dimension to increase reception robustness. By carefully scheduling the multiple sources and relays'...

    Provided By Lancaster University

  • White Papers // Jul 2009

    Compressing MAC Headers on Shared Wireless Media

    This paper presents a header compression algorithm that unlike previous protocols is capable of compressing MAC headers in a multiple-access (shared) channel. Previous schemes could not compress MAC headers because the address fields are needed to identify the in-tended destination as well as the intended context space under which compressed...

    Provided By Lancaster University

  • White Papers // Jun 2008

    A Utility-Based QoS Model for Emerging Multimedia Applications

    For traditional internet applications, the quality of network delivery is not critical since applications like web browsing and email are elastic and can tolerate certain network impairments. However, with increasing bandwidth more high-throughput, always-on, inelastic multimedia applications are introduced to the IP infrastructure. Guaranteed quality of end user's experience in...

    Provided By Lancaster University

  • White Papers // Oct 2009

    Touch-Display Keyboards and Their Integration With Graphical User Interfaces

    The authors introduce Touch-Display Keyboards (TDK) that retain the traditional physical key layout and in addition provide dynamic display and touch-sensing capability for each key. They demonstrate how TDKs can be seamlessly integrated with graphical user interfaces by extending the graphical output as well as three-state input across the keyboard's...

    Provided By Lancaster University