Lancaster University

Displaying 1-40 of 97 results

  • White Papers // May 2013

    Experiences of Using a Hybrid Cloud to Construct an Environmental Virtual Observatory

    Environmental science is often fragmented: data is collected using mismatched formats and conventions, and models are misaligned and run in isolation. Cloud computing offers a lot of potential in the way of resolving such issues by supporting data from different sources and at various scales, by facilitating the integration of...

    Provided By Lancaster University

  • White Papers // Nov 2012

    Service-Centric Networking Extensions

    This paper discusses several issues of Service-Centric Networking (SCN) as an extension of the Information-Centric Networking (ICN) paradigm. SCN allows extended caching, where not exactly the same content as requested can be read from caches, but similar content can be used to produce the content requested, e.g., by filtering or...

    Provided By Lancaster University

  • White Papers // Nov 2012

    Evaluation of the Socio-Economic Implications of Contractual Mobility in Roaming Architectures

    The European market for roaming services has historically experienced poor or no competition and, when competition has occurred, prices have been largely resistant to its downward pressure. The root cause of this failure lies in the technical limitations of the existing roaming architecture. An architecture able to remove these limitations...

    Provided By Lancaster University

  • White Papers // Nov 2012

    Interaction-Oriented Software Engineering: Concepts and Principles

    Following established tradition, software engineering today is rooted in a conceptually centralized way of thinking. The primary SE artifact is a specification of a machine - a computational artifact - that would meet the (elicited and) stated requirements. Therein lies a fundamental mismatch with (open) sociotechnical systems, which involve multiple...

    Provided By Lancaster University

  • White Papers // Jun 2012

    Non-Convex Mixed-Integer Nonlinear Programming: A Survey

    A wide range of problems arising in practical applications can be formulated as Mixed-Integer Non-Linear Programs (MINLPs). For the case in which the objective and constraint functions are convex, some quite effective exact and heuristic algorithms are available. When non-convexities are present, however, things become much more difficult, since then...

    Provided By Lancaster University

  • White Papers // Jun 2012

    Malware Detection in the Context of Cloud Computing

    Cloud computing is becoming an increasingly popular paradigm due to new services and increased media attention. This increase in popularity has lead to concerns over the security of the cloud, especially from threats such as malware. As more services migrate to a cloud architecture the cloud will become a more...

    Provided By Lancaster University

  • White Papers // Apr 2012

    Practical Network Coding in Sensor Networks: Quo Vadis?

    Network coding is a novel concept for improving network capacity. This additional capacity may be used to increase throughput or reliability. Also in wireless networks, network coding has been proposed as a method for improving communication. The authors present their experience from two studies of applying network coding in realistic...

    Provided By Lancaster University

  • White Papers // Jan 2012

    Sequential Monte Carlo Methods for Localisation in Wireless Networks

    Wireless indoor and outdoor localisation systems received a great deal of attention in recent years. This paper surveys first the current state-of-the-art of localisation techniques. Next, it formulates the problem of localisation within Bayesian framework and presents sequential Monte Carlo methods for localisation based on Received Signal Strength Indicators (RSSIs)....

    Provided By Lancaster University

  • White Papers // Jul 2011

    3D Integration and the Limits of Silicon Computation

    The Intrinsic Computational Efficiency (ICE) of silicon defines the upper limit of the amount of computation within a given technology and power envelope. The Effective Computational Efficiency (ECE) and the Effective Computational Density (ECD) of silicon, by taking computation, memory and communication into account, offer a more realistic upper bound...

    Provided By Lancaster University

  • White Papers // Jun 2011

    FDI In The Service Sector ? Propagator Of Growth For India?

    The last two decades have witnessed an unprecedented growth of the Indian service sector. This paper aims to analyze the growth dynamics of the FDI. It intends to see whether the growth in FDI has any significant impact on the service sector growth and also investigates whether a growth in...

    Provided By Lancaster University

  • White Papers // Jun 2011

    Enhanced Positioning Techniques for Hybrid Wireless Network

    This paper is to propose a reliable and accurate positioning method, which provides location estimates for the mobile user in heterogeneous wireless network (IEEE802.11/WiFi, IEEE802.16/ WiMAX and LTE technologies). The propose data fusion methodology utilises measurements and features such as Time Of Arrival (TOA) measurements and Multiple Input, Multiple Output...

    Provided By Lancaster University

  • White Papers // Jun 2011

    Towards Resilient Networks Using Situation Awareness

    Resilience will be an essential design and operational characteristic of future networks. This paper first surveys resilient networks and Situation Awareness (SA) in cyberspace. Then, SA is introduced in the detection module development of the authors' dynamic adaptation architecture that realizes the resilience control loop. Finally, a state transition model...

    Provided By Lancaster University

  • White Papers // May 2011

    WSN Evaluation in Industrial Environments First Results and Lessons Learned

    The GINSENG project develops performance-controlled wireless sensor networks that can be used for time-critical applications in hostile environments such as industrial plant automation and control. GINSENG aims at integrating wireless sensor networks with existing enterprise resource management solutions using a middleware. A cornerstone is the evaluation in a challenging industrial...

    Provided By Lancaster University

  • White Papers // May 2011

    Software for Schenkerian Analysis

    Software developed to automate the process of Schenkerian analysis is described. The current state of the art is that moderately good analyzes of small extracts can be generated, but more information is required about the criteria by which analysts make decisions among alter-native interpretations in the course of analysis. The...

    Provided By Lancaster University

  • White Papers // Apr 2011

    Securing Communication in 6LoWPAN With Compressed IPsec

    With the inception of IPv6 it is possible to assign a unique ID to each device on planet. Recently, wireless sensor networks and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Real-world deployments of WSN demand secure communication. The receiver should be able to verify that sensor...

    Provided By Lancaster University

  • White Papers // Apr 2011

    Reasoning About Faults in Aspect-Oriented Programs: A Metrics-Based Evaluation

    Aspect-Oriented Programming (AOP) aims at facilitating program comprehension and maintenance in the presence of crosscutting concerns. Aspect code is often introduced and extended as the software projects evolve. Unfortunately, the authors still lack a good understanding of how faults are introduced in evolving aspect-oriented programs. More importantly, there is little...

    Provided By Lancaster University

  • White Papers // Feb 2011

    6LoWPAN Extension for IPsec

    Real-world deployments of Wireless Sensor Networks (WSNs) require secure communication. Recently, WSNs and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Available IPv6 protocol stacks can use IPsec to secure data exchange. Thus, it is desirable to extend 6LoWPAN such that IPsec communication with IPv6 nodes is...

    Provided By Lancaster University

  • White Papers // Feb 2011

    A Collaborative AAA Architecture to Enable Secure Real-World Network Mobility

    Mobile Networks are emerging in the real world in various scenarios, from networks in public transportation to personal networks in consumer electronics. The NEMO BS protocol provides constant network connectivity and reachability for the nodes of these Mobile Networks in a seamless manner despite their roaming. However, NEMO BS has...

    Provided By Lancaster University

  • White Papers // Feb 2011

    On the Characterization of Network Traffic Dynamics

    Characterizing backbone networks poses a significant challenge due to the unstable and fluctuated behavior exhibited by network traffic dynamics. Modeling techniques developed for volume-based traffic profiling rely on the statistical assumptions of stationarity, Gaussianity and linearity, whose applicability has not been thoroughly investigated throughout past and recent work. The authors...

    Provided By Lancaster University

  • White Papers // Jan 2011

    The Role of Reflective Middleware in Supporting Flexible Security Policies

    Next generation middleware must support applications in the face of increasing diversity in interaction paradigms, end system types and network styles. Therefore, to secure applications, flexible security policies must be configured and indeed reconfigured at run-time. In this paper, the authors propose an approach combining the openness of reflective middleware...

    Provided By Lancaster University

  • White Papers // Dec 2010

    BurstProbe: Debugging Time-Critical Data Delivery in Wireless Sensor Networks

    In this paper the authors present BurstProbe, a new technique to accurately measure link burstiness in a wireless sensor network employed for time-critical data delivery. Measurement relies on shared probing slots that are embedded in the transmission schedule and used by nodes to assess link burstiness over time. The acquired...

    Provided By Lancaster University

  • White Papers // Dec 2010

    Towards a Secure and Seamless Host Mobility for the Real World

    Mobile IPv6 has been developed for quite a few years now, but it has yet to bring its constant connectivity and global reachability benefits to mobile devices in real world scenarios, mainly due to lack of trouble-free and secure network access and data transmission for devices as they roam. In...

    Provided By Lancaster University

  • White Papers // Nov 2010

    Vehicle-Driver Communication Using Off-The-Shelf Transceivers

    Almost all modern cars can be controlled remotely using a personal communicator (keyfob). However, the degree of interaction between currently available personal communicators and cars is very limited. The communication link is unidirectional and the communication range is limited to a few dozen meters. However, there are many interesting applications...

    Provided By Lancaster University

  • White Papers // Sep 2010

    Building Extensible Networks With Rule-Based Forwarding

    The authors present a network design that provides flexible and policy-compliant forwarding. The proposal centers around a new architectural concept: that of packet rules. A rule is a simple if-then-else construct that describes the manner in which the network should - or should not - forward packets. A packet identifies...

    Provided By Lancaster University

  • White Papers // Aug 2010

    The Influence Of Intuitive Expertise In Transforming Music Industry Relationships

    The music industry has been going through fundamental technology driven transformation altering its competitive structure. Up-to-date, intellectual property rights and new forms of music distribution have been the main focus of academic research. In this working paper, the authors examine another revolutionary change taking place in this industry. This concerns...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Interacted Service In Business Networks

    This paper builds on developments within IMP research and within the literature on Service Dominant Logic and advances the idea of interacted service in business networks. Interacted service involves specific and often multiple problem-coping by, for and between business actors. The paper discusses the value of the concept of interacted...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Signalling Sustainability Strategies: Preliminary Findings From Two Case Studies

    The purpose of this paper is to develop the understanding on how sustainability strategies emerge. Two case studies focusing on business groups from the cork and electrical equipment sectors are compared and contrasted in terms of their sustainability strategies. They argue that the formation of a holistic sustainability strategy is...

    Provided By Lancaster University

  • White Papers // Aug 2010

    The Use Of Capital In Networks

    The widespread use of leverage in business networks raises a series of questions about the companies' detrimental reliance on business networks to finance their operations. In this paper, the author addresses a gap in the knowledge of the use of capital in business networks by investigating the increasing levels of...

    Provided By Lancaster University

  • White Papers // Aug 2010

    The Practice Of Business Models

    This paper examines the concept of business models. Through the paper of secondary data from the recorded sound industry, the authors explore how business models change over time. The history of the recorded sound industry, from its birth in the 1870s shows how technologies, market offerings and the network architecture...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Market Shaping And Valuation In The Ugandan Coffee Market

    This paper project seeks to explain from a market practice perspective how the coffee market in Uganda is shaped, and draws from the works of ?aliskan and Callon (2009) and anthropology to investigate the pragmatics of economic valuation of Ugandan coffee. While much previous work on agri-food commodities has been...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Understanding The Impact Of Marketing - Purchasing Collaboration On Improving Firm Performance: An Empirical Study Of A Transitional Economy

    Improving business relationships in complex business networks requires at least two distinctive competences with regard to the marketing function of a firm. Firstly, the company needs to develop a deep understanding of its business partners, especially buyers. In order to best serve these customers in a mutually beneficial way, the...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Strategies for Network Resilience: Capitalising on Policies

    Networked systems is subject to a wide range of challenges whose nature changes over time, including malicious attacks and operational overload. Numerous mechanisms can be used to ensure the resilience of networked systems, but it can be difficult to define how these mechanisms should be configured in networks that support...

    Provided By Lancaster University

  • White Papers // Jul 2010

    Implementation and Evaluation of Distance-Based Message Authentication

    A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message transmission making it possible to authenticate messages based on distance. In this paper, the authors present a practical implementation of Distance Based Message Authentication (DBMA) for WSNs...

    Provided By Lancaster University

  • White Papers // Jun 2010

    On Improving Security of GPT Cryptosystems

    The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding. This enabled using public keys of a smaller size. Several attacks against this system were...

    Provided By Lancaster University

  • White Papers // Jun 2010

    GINSENG: Performance Control in Wireless Sensor Networks

    The goal of the GINSENG project is a performance-controlled sensor network suitable for applications with specific network performance requirements, such as plant automation and health monitoring. Any such sensor network must include a deterministic MAC protocol that can meet the application's targets in areas like delivery delays and reliability. The...

    Provided By Lancaster University

  • White Papers // May 2010

    Classification of Spontaneous Device Association From a Usability Perspective

    As computing devices become ubiquitous, devices are expected to encounter and associate with one another spontaneously to form ad hoc networks for sharing resources. One of the challenges in research remains in the task of making a device association scheme secure and, at the same time, easy to use. There...

    Provided By Lancaster University

  • White Papers // May 2010

    Identifying Legitimate Clients Under Distributed Denial-of-Service Attacks

    Distributed Denial of Service (DDoS) attacks are a persistent, current, and very real threat to networks. Expanding upon a flexible distributed framework for network remediation utilising multiple strategies, the authors examine a novel fusion of methods to maximise throughput from legitimate clients and minimise the impact from attackers. The basic...

    Provided By Lancaster University

  • White Papers // Apr 2010

    Time-Critical Data Delivery in Wireless Sensor Networks

    A number of Wireless Sensor Network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmission. This paper shows how WSNs can be dimensioned, deployed and operated such that both reliable and timely data delivery is ensured while scarce...

    Provided By Lancaster University

  • White Papers // Apr 2010

    Time-Critical Data Delivery InWireless Sensor Networks

    A number of Wireless Sensor Network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmission. This paper shows how WSNs can be dimensioned, deployed and operated such that both reliable and timely data delivery is ensured while scarce...

    Provided By Lancaster University

  • White Papers // Apr 2010

    Business Model As An Institution: The Case Of First Iranian Public Private Partnership In Healthcare Industry

    As a result of the author's first year PhD in Marketing Department Lancaster University, this paper proposal outlines a theoretical underpinning of new approach to study of business models concept by the means of Actor-Network theory. Reviewing the literature, and identifying different perspective in defining business models, the paper shows...

    Provided By Lancaster University

  • White Papers // Jun 2011

    Towards Resilient Networks Using Situation Awareness

    Resilience will be an essential design and operational characteristic of future networks. This paper first surveys resilient networks and Situation Awareness (SA) in cyberspace. Then, SA is introduced in the detection module development of the authors' dynamic adaptation architecture that realizes the resilience control loop. Finally, a state transition model...

    Provided By Lancaster University

  • White Papers // Feb 2011

    6LoWPAN Extension for IPsec

    Real-world deployments of Wireless Sensor Networks (WSNs) require secure communication. Recently, WSNs and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Available IPv6 protocol stacks can use IPsec to secure data exchange. Thus, it is desirable to extend 6LoWPAN such that IPsec communication with IPv6 nodes is...

    Provided By Lancaster University

  • White Papers // May 2011

    Software for Schenkerian Analysis

    Software developed to automate the process of Schenkerian analysis is described. The current state of the art is that moderately good analyzes of small extracts can be generated, but more information is required about the criteria by which analysts make decisions among alter-native interpretations in the course of analysis. The...

    Provided By Lancaster University

  • White Papers // Apr 2012

    Practical Network Coding in Sensor Networks: Quo Vadis?

    Network coding is a novel concept for improving network capacity. This additional capacity may be used to increase throughput or reliability. Also in wireless networks, network coding has been proposed as a method for improving communication. The authors present their experience from two studies of applying network coding in realistic...

    Provided By Lancaster University

  • White Papers // Feb 2011

    On the Characterization of Network Traffic Dynamics

    Characterizing backbone networks poses a significant challenge due to the unstable and fluctuated behavior exhibited by network traffic dynamics. Modeling techniques developed for volume-based traffic profiling rely on the statistical assumptions of stationarity, Gaussianity and linearity, whose applicability has not been thoroughly investigated throughout past and recent work. The authors...

    Provided By Lancaster University

  • White Papers // Jan 2012

    Sequential Monte Carlo Methods for Localisation in Wireless Networks

    Wireless indoor and outdoor localisation systems received a great deal of attention in recent years. This paper surveys first the current state-of-the-art of localisation techniques. Next, it formulates the problem of localisation within Bayesian framework and presents sequential Monte Carlo methods for localisation based on Received Signal Strength Indicators (RSSIs)....

    Provided By Lancaster University

  • White Papers // Jun 2011

    Enhanced Positioning Techniques for Hybrid Wireless Network

    This paper is to propose a reliable and accurate positioning method, which provides location estimates for the mobile user in heterogeneous wireless network (IEEE802.11/WiFi, IEEE802.16/ WiMAX and LTE technologies). The propose data fusion methodology utilises measurements and features such as Time Of Arrival (TOA) measurements and Multiple Input, Multiple Output...

    Provided By Lancaster University

  • White Papers // Jun 2012

    Non-Convex Mixed-Integer Nonlinear Programming: A Survey

    A wide range of problems arising in practical applications can be formulated as Mixed-Integer Non-Linear Programs (MINLPs). For the case in which the objective and constraint functions are convex, some quite effective exact and heuristic algorithms are available. When non-convexities are present, however, things become much more difficult, since then...

    Provided By Lancaster University

  • White Papers // Jun 2010

    On Improving Security of GPT Cryptosystems

    The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding. This enabled using public keys of a smaller size. Several attacks against this system were...

    Provided By Lancaster University

  • White Papers // Feb 2009

    RELAX: Incorporating Uncertainty Into the Specification of Self-Adaptive Systems

    Self-adaptive systems have the capability to autonomously modify their behavior at run-time in response to changes in their environment. Self-adaptation is particularly necessary for applications that must run continuously, even under adverse conditions and changing requirements; sample domains include automotive systems, telecommunications, and environmental monitoring systems. While a few techniques...

    Provided By Lancaster University

  • White Papers // Nov 2010

    Vehicle-Driver Communication Using Off-The-Shelf Transceivers

    Almost all modern cars can be controlled remotely using a personal communicator (keyfob). However, the degree of interaction between currently available personal communicators and cars is very limited. The communication link is unidirectional and the communication range is limited to a few dozen meters. However, there are many interesting applications...

    Provided By Lancaster University

  • White Papers // Jun 2010

    GINSENG: Performance Control in Wireless Sensor Networks

    The goal of the GINSENG project is a performance-controlled sensor network suitable for applications with specific network performance requirements, such as plant automation and health monitoring. Any such sensor network must include a deterministic MAC protocol that can meet the application's targets in areas like delivery delays and reliability. The...

    Provided By Lancaster University

  • White Papers // Aug 2010

    Strategies for Network Resilience: Capitalising on Policies

    Networked systems is subject to a wide range of challenges whose nature changes over time, including malicious attacks and operational overload. Numerous mechanisms can be used to ensure the resilience of networked systems, but it can be difficult to define how these mechanisms should be configured in networks that support...

    Provided By Lancaster University

  • White Papers // Apr 2010

    Time-Critical Data Delivery in Wireless Sensor Networks

    A number of Wireless Sensor Network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmission. This paper shows how WSNs can be dimensioned, deployed and operated such that both reliable and timely data delivery is ensured while scarce...

    Provided By Lancaster University

  • White Papers // May 2010

    Identifying Legitimate Clients Under Distributed Denial-of-Service Attacks

    Distributed Denial of Service (DDoS) attacks are a persistent, current, and very real threat to networks. Expanding upon a flexible distributed framework for network remediation utilising multiple strategies, the authors examine a novel fusion of methods to maximise throughput from legitimate clients and minimise the impact from attackers. The basic...

    Provided By Lancaster University

  • White Papers // May 2010

    Classification of Spontaneous Device Association From a Usability Perspective

    As computing devices become ubiquitous, devices are expected to encounter and associate with one another spontaneously to form ad hoc networks for sharing resources. One of the challenges in research remains in the task of making a device association scheme secure and, at the same time, easy to use. There...

    Provided By Lancaster University

  • White Papers // Mar 2010

    Improving Wireless Sensor Network Resilience With the INTERSECTION Framework

    This paper investigates the INTERSECTION framework's ability to build resilience into wireless sensor networks. The framework's general details are examined along with general approaches to protection against misbehaving WSN nodes. Three different approaches to remediation were implemented and tested on a TinyOS network for their different operating characteristics. Many aspects...

    Provided By Lancaster University

  • White Papers // Jan 2010

    Requirements Reflection: Requirements as Runtime Entities

    Computational reflection is a well-established technique that gives a program the ability to dynamically observe and possibly modify its behavior. To date, however, reflection is mainly applied either to the software architecture or its implementation. The authors know of no approach that fully supports requirements reflection - that is, making...

    Provided By Lancaster University

  • White Papers // Mar 2010

    A Comparison of Static and Dynamic Component Models for Wireless Sensor Networks

    In this paper, the authors provide a detailed discussion and evaluation of the theoretical and practical differences between static and dynamic component models as the foundations of programming wireless sensor nodes. As the static benchmark they examine the nesC component model underpinning TinyOS; and as the dynamic benchmark they examine...

    Provided By Lancaster University

  • White Papers // Jan 2010

    Preserving Dynamic Reconfiguration Consistency in Aspect Oriented Middleware

    Aspect-oriented middleware is a promising technology for the realisation of dynamic reconfiguration in heterogeneous distributed systems. However, like other dynamic reconfiguration approaches, AO-middleware-based reconfiguration requires that the consistency of the system is maintained across reconfigurations. AO-middleware-based reconfiguration is an ongoing research topic and several consistency approaches have been proposed. However,...

    Provided By Lancaster University

  • White Papers // Jan 2010

    Poster Abstract: A MAC Protocol for Industrial Process Automation and Control

    Industrial process automation and control is a promising application domain of Wireless Sensor and Actuator Networks (WSAN). This type of application requires reliable and timely data delivery which is inherently difficult to achieve in wireless communication. In this paper, the authors present a MAC protocol for the aforementioned application domain....

    Provided By Lancaster University

  • White Papers // Jan 2010

    Poster Abstract: An Implementation of Distance-Based Message Authentication for WSNs

    Distance-Based Message Authentication (DBMA) provides an additional layer of access control and helps defend against key compromise and denial-of-service attacks on constrained nodes. The distance between sender and receiver is measured securely. Messages sent from outside a defined physical distance can be rejected early, protecting vulnerable higher layers. The authors...

    Provided By Lancaster University

  • White Papers // Jul 2010

    Implementation and Evaluation of Distance-Based Message Authentication

    A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message transmission making it possible to authenticate messages based on distance. In this paper, the authors present a practical implementation of Distance Based Message Authentication (DBMA) for WSNs...

    Provided By Lancaster University

  • White Papers // Oct 2009

    RELAX: A Language to Address Uncertainty in Self-Adaptive Systems Requirements

    Self-adaptive systems have the capability to autonomously modify their behavior at run-time in response to changes in their environment. Self-adaptation is particularly necessary for applications that must run continuously, even under adverse conditions and changing requirements; sample domains include automotive systems, telecommunications, and environmental monitoring systems. While a few techniques...

    Provided By Lancaster University

  • White Papers // Jun 2011

    FDI In The Service Sector ? Propagator Of Growth For India?

    The last two decades have witnessed an unprecedented growth of the Indian service sector. This paper aims to analyze the growth dynamics of the FDI. It intends to see whether the growth in FDI has any significant impact on the service sector growth and also investigates whether a growth in...

    Provided By Lancaster University

  • White Papers // Mar 2009

    Unsupervised Two-Class & Multi-Class Support Vector Machines for Abnormal Traffic Characterization

    Although measurement-based real-time traffic classification has received considerable research attention, the timing constraints imposed by the high accuracy requirements and the learning phase of the algorithms employed still remain a challenge. In this paper the authors propose a measurement-based classification framework that exploits unsupervised learning to accurately categorise network anomalies...

    Provided By Lancaster University

  • White Papers // Jul 2009

    A Study on Transmission Delay With Finite Coding Length in Wireless Cooperative Networks

    In this paper, the authors consider the problem of transmission delay in terms of finite coding length derived from the random coding bound for different cooperative protocols. Specifically, they first study the impact of cooperative transmission on the routing decision for wireless ad-hoc networks, where a routing optimization problem is...

    Provided By Lancaster University

  • White Papers // Apr 2009

    Interference Subtraction With Supplementary Cooperation in Wireless Cooperative Networks

    In wireless networks, the broadcast nature of wireless transmission enables cooperation by sharing the same transmissions with nearby receivers and thus can help improve spatial reuse and boost network throughput along a multi-hop routing. The performance of wireless networks can be further improved if prior information available at the receivers...

    Provided By Lancaster University

  • White Papers // Sep 2009

    Transmission Capacity of Decode-and-Forward Cooperation in Overlaid Wireless Networks

    In this paper, the authors employ a stochastic geometry model to analyze the transmission capacity of the Decode-And-Forward (DAF) cooperation scheme in an overlaid wireless network where a PRimary (PR) network and a SecondaRy (SR) network coexist together. The PR users employ DAF scheme and have a higher priority to...

    Provided By Lancaster University

  • White Papers // Jan 2009

    Application of Joint Source-Relay Scheduling to Cooperative Multiple Access Channels

    In this paper, the authors propose a novel spectrally efficient cooperative transmission protocol for multiple access scenarios. Different to some existing cooperative multiple access schemes, the proposed scheme can exploit the availability of relays as an extra dimension to increase reception robustness. By carefully scheduling the multiple sources and relays'...

    Provided By Lancaster University

  • White Papers // Jul 2009

    Compressing MAC Headers on Shared Wireless Media

    This paper presents a header compression algorithm that unlike previous protocols is capable of compressing MAC headers in a multiple-access (shared) channel. Previous schemes could not compress MAC headers because the address fields are needed to identify the in-tended destination as well as the intended context space under which compressed...

    Provided By Lancaster University

  • White Papers // Feb 2011

    A Collaborative AAA Architecture to Enable Secure Real-World Network Mobility

    Mobile Networks are emerging in the real world in various scenarios, from networks in public transportation to personal networks in consumer electronics. The NEMO BS protocol provides constant network connectivity and reachability for the nodes of these Mobile Networks in a seamless manner despite their roaming. However, NEMO BS has...

    Provided By Lancaster University

  • White Papers // May 2011

    WSN Evaluation in Industrial Environments First Results and Lessons Learned

    The GINSENG project develops performance-controlled wireless sensor networks that can be used for time-critical applications in hostile environments such as industrial plant automation and control. GINSENG aims at integrating wireless sensor networks with existing enterprise resource management solutions using a middleware. A cornerstone is the evaluation in a challenging industrial...

    Provided By Lancaster University

  • White Papers // Dec 2010

    BurstProbe: Debugging Time-Critical Data Delivery in Wireless Sensor Networks

    In this paper the authors present BurstProbe, a new technique to accurately measure link burstiness in a wireless sensor network employed for time-critical data delivery. Measurement relies on shared probing slots that are embedded in the transmission schedule and used by nodes to assess link burstiness over time. The acquired...

    Provided By Lancaster University

  • White Papers // Apr 2010

    Time-Critical Data Delivery InWireless Sensor Networks

    A number of Wireless Sensor Network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmission. This paper shows how WSNs can be dimensioned, deployed and operated such that both reliable and timely data delivery is ensured while scarce...

    Provided By Lancaster University

  • White Papers // Sep 2010

    Building Extensible Networks With Rule-Based Forwarding

    The authors present a network design that provides flexible and policy-compliant forwarding. The proposal centers around a new architectural concept: that of packet rules. A rule is a simple if-then-else construct that describes the manner in which the network should - or should not - forward packets. A packet identifies...

    Provided By Lancaster University

  • White Papers // Mar 2009

    Retransmission and Backoff Strategies for Wireless Broadcasting

    This paper defines a wireless broadcasting algorithm as having two components: a retransmission strategy and a backoff strategy. Several strategies are proposed in this paper and a comparative analysis is presented between existing algorithms and the strategies proposed herein. Simulation experiments and analysis are used to study or demonstrate the...

    Provided By Lancaster University

  • White Papers // Feb 2009

    Determinants Of Outstanding Mortgage Loan To Value Ratios: Evidence From The Netherlands

    This paper studies the determinants and behavior of outstanding mortgage Loan To Value (LTV) ratios for a panel data set of 5,179 households over the period 1992-2005. The authors find that outstanding LTVs are driven by household characteristics, life-cycle effects and mortgage type characteristics. LTV declines with the time elapsed...

    Provided By Lancaster University

  • White Papers // Feb 2009

    Are We Extracting The True Risk Neutral Density From Option Prices? A Question With No Easy Answer

    In this paper, the authors raise a question on the theoretical foundation of option implied risk neutral density. They prove that given any number of options, there exist numerous risk neutral densities which are piecewise constant, have only two values, either a lower bound or an upper bound on the...

    Provided By Lancaster University

  • White Papers // Mar 2009

    Exploiting Synergies Between Coexisting Overlays

    Overlay networks have emerged as a powerful paradigm to realise a large range of distributed services. However, as the number of overlays grows and the systems that use them become more interconnected, overlays must increasingly co-exist within the same infrastructure. When this happens, overlays have to compete for limited resources,...

    Provided By Lancaster University