Masaryk University

Displaying 1-12 of 12 results

  • White Papers // Jan 2013

    Agile BPM in the Age of Cloud Technologies

    This paper is focused on application of agile principles during adoption of Business Process Management (BPM) in an organization. The authors propose some agile techniques for gathering requirements and iterative process design. Such techniques help to obtain realistic processes which are easily adaptable to changing business requirements and do not...

    Provided By Masaryk University

  • White Papers // May 2012

    Revealing and Analysing Modem Malware

    Malware targeting broadband devices like ADSL modems, routers and wireless access points is very frequent in recent days. In this paper, the authors provide a formal description of modem malware life cycle. Furthermore, they propose a set of techniques to perform detailed analysis of infected modem and they provide the...

    Provided By Masaryk University

  • White Papers // Mar 2012

    GPU Implementation of Linear Morphological Openings with Arbitrary Angle

    Linear morphological openings and closings are important non-linear operators from mathematical morphology. In practical applications, many different orientations of digital line segments must typically be considered. In this paper, the authors review efficient sequential as well as parallel algorithms for the computation of linear openings and closings, compare the performance...

    Provided By Masaryk University

  • White Papers // Feb 2012

    STANSE: Bug-Finding Framework for C Programs

    STANSE is a free (available under the GPLv2 license) modular framework for finding bugs in C programs using static analysis. Its two main design goals are ability to process large software projects like the Linux kernel and extensibility with new bug-finding techniques with a minimal e ort. Currently there are...

    Provided By Masaryk University

  • White Papers // May 2010

    Evaluation of Lifetime Bounds of Wireless Sensor Networks

    In this paper the authors estimate lifetime bounds of a network of motes which communicate with each other using IEEE 802.15.4 standard. Different frame structures of IEEE 802.15.4 along with CSMA/CA medium access mechanism are investigated to discover the overhead of channel acquisition, header and footer of data frame, and...

    Provided By Masaryk University

  • White Papers // May 2010

    Integration of Java Federations in HLA Compliant Simulations Governed by CERTI

    High Level Architecture constitutes a modern approach to distributed simulation of complex systems. This paper discusses extending CERTI, an open-source Run-Time Infrastructure, with binding to previously unsupported Java language. In addition, the paper investigates ways of simplifying the process of adding support for new languages by using automated code generation....

    Provided By Masaryk University

  • White Papers // Apr 2010

    Automatic Source Code Transformations for Strengthening Practical Security of Smart Card Applications

    The availability of programmable cryptographic smart cards provides possibility to run application in significantly more secured environment then ordinary personal computer. Smart card platforms like Java Card or .NET allow to implement portable applications that can be run on different smart card hardware. Barriers for a skilled Java developer switching...

    Provided By Masaryk University

  • White Papers // Dec 2009

    DiVinE-CUDA - A Tool for GPU Accelerated LTL Model Checking

    In this paper the authors present a tool that performs CUDA accelerated LTL Model Checking. The tool exploits parallel algorithm MAP adjusted to the NVIDIA CUDA architecture in order to efficiently detect the presence of accepting cycles in a directed graph. Accepting cycle detection is the core algorithmic procedure in...

    Provided By Masaryk University

  • White Papers // Feb 2009

    The Causes Of Deflation And Some Selected Problems In Japanese Economy

    Japanese economy has been experiencing the deflation since 1992. It is not only the cause of the recession in Japan but it also constituted the result of the recession. Anyway, the deflation which we have faced till now is closely related to a business trend in Japan. Firstly, authors analyze...

    Provided By Masaryk University

  • White Papers // Dec 2008

    Multi-mechanism Single Sign-On in Grids

    Recently, a lot of effort has been invested in development of various types of authentication mechanisms that offer strong security characteristics for building grid systems. Being based on one of the mechanisms, most grid environments today provide strong authentication protocols, however, they are usually bound with only one, in most...

    Provided By Masaryk University

  • White Papers // Aug 2008

    Electronic Payments and Electronic Money - Some General Remarks on Factual and Legal Developments

    The author analyses parallels as well as differences between cash payments and cashless payments from a general juridical point of view. A closer look at some new developments often called "Smart" or "Innovative" shows that only central bank money possesses a very special quality. Various projects of e-payments lead to...

    Provided By Masaryk University

  • White Papers // May 2008

    A Federated Framework for Secure Collaborative Systems

    Videoconferences can play an important role in contemporary e-learning systems since the authors allow students to attend courses that are given by teachers from a remote location. Videoconferences also make life easier for researchers from many different institutions who collaborate on a joint project, since they can easily coordinate their...

    Provided By Masaryk University

  • White Papers // Jan 2013

    Agile BPM in the Age of Cloud Technologies

    This paper is focused on application of agile principles during adoption of Business Process Management (BPM) in an organization. The authors propose some agile techniques for gathering requirements and iterative process design. Such techniques help to obtain realistic processes which are easily adaptable to changing business requirements and do not...

    Provided By Masaryk University

  • White Papers // Dec 2008

    Multi-mechanism Single Sign-On in Grids

    Recently, a lot of effort has been invested in development of various types of authentication mechanisms that offer strong security characteristics for building grid systems. Being based on one of the mechanisms, most grid environments today provide strong authentication protocols, however, they are usually bound with only one, in most...

    Provided By Masaryk University

  • White Papers // Mar 2012

    GPU Implementation of Linear Morphological Openings with Arbitrary Angle

    Linear morphological openings and closings are important non-linear operators from mathematical morphology. In practical applications, many different orientations of digital line segments must typically be considered. In this paper, the authors review efficient sequential as well as parallel algorithms for the computation of linear openings and closings, compare the performance...

    Provided By Masaryk University

  • White Papers // Apr 2010

    Automatic Source Code Transformations for Strengthening Practical Security of Smart Card Applications

    The availability of programmable cryptographic smart cards provides possibility to run application in significantly more secured environment then ordinary personal computer. Smart card platforms like Java Card or .NET allow to implement portable applications that can be run on different smart card hardware. Barriers for a skilled Java developer switching...

    Provided By Masaryk University

  • White Papers // May 2010

    Integration of Java Federations in HLA Compliant Simulations Governed by CERTI

    High Level Architecture constitutes a modern approach to distributed simulation of complex systems. This paper discusses extending CERTI, an open-source Run-Time Infrastructure, with binding to previously unsupported Java language. In addition, the paper investigates ways of simplifying the process of adding support for new languages by using automated code generation....

    Provided By Masaryk University

  • White Papers // Aug 2008

    Electronic Payments and Electronic Money - Some General Remarks on Factual and Legal Developments

    The author analyses parallels as well as differences between cash payments and cashless payments from a general juridical point of view. A closer look at some new developments often called "Smart" or "Innovative" shows that only central bank money possesses a very special quality. Various projects of e-payments lead to...

    Provided By Masaryk University

  • White Papers // Feb 2009

    The Causes Of Deflation And Some Selected Problems In Japanese Economy

    Japanese economy has been experiencing the deflation since 1992. It is not only the cause of the recession in Japan but it also constituted the result of the recession. Anyway, the deflation which we have faced till now is closely related to a business trend in Japan. Firstly, authors analyze...

    Provided By Masaryk University

  • White Papers // May 2010

    Evaluation of Lifetime Bounds of Wireless Sensor Networks

    In this paper the authors estimate lifetime bounds of a network of motes which communicate with each other using IEEE 802.15.4 standard. Different frame structures of IEEE 802.15.4 along with CSMA/CA medium access mechanism are investigated to discover the overhead of channel acquisition, header and footer of data frame, and...

    Provided By Masaryk University

  • White Papers // Dec 2009

    DiVinE-CUDA - A Tool for GPU Accelerated LTL Model Checking

    In this paper the authors present a tool that performs CUDA accelerated LTL Model Checking. The tool exploits parallel algorithm MAP adjusted to the NVIDIA CUDA architecture in order to efficiently detect the presence of accepting cycles in a directed graph. Accepting cycle detection is the core algorithmic procedure in...

    Provided By Masaryk University

  • White Papers // May 2008

    A Federated Framework for Secure Collaborative Systems

    Videoconferences can play an important role in contemporary e-learning systems since the authors allow students to attend courses that are given by teachers from a remote location. Videoconferences also make life easier for researchers from many different institutions who collaborate on a joint project, since they can easily coordinate their...

    Provided By Masaryk University

  • White Papers // Feb 2012

    STANSE: Bug-Finding Framework for C Programs

    STANSE is a free (available under the GPLv2 license) modular framework for finding bugs in C programs using static analysis. Its two main design goals are ability to process large software projects like the Linux kernel and extensibility with new bug-finding techniques with a minimal e ort. Currently there are...

    Provided By Masaryk University

  • White Papers // May 2012

    Revealing and Analysing Modem Malware

    Malware targeting broadband devices like ADSL modems, routers and wireless access points is very frequent in recent days. In this paper, the authors provide a formal description of modem malware life cycle. Furthermore, they propose a set of techniques to perform detailed analysis of infected modem and they provide the...

    Provided By Masaryk University