NICTA

Displaying 1-40 of 55 results

  • White Papers // Jan 2014

    Unifying DVFS and Offlining in Mobile Multicores

    Energy efficiency is a primary design criterion of the modern Smartphone due to limitations in battery capacity. Multi-core processors are now commonplace in these devices, which adds a new dimension, the number cores used, to energy management. In this paper, the authors investigate how the mechanisms of frequency scaling and...

    Provided By NICTA

  • White Papers // Nov 2013

    ICT Support for Regulatory Compliance of Business Processes

    Regulatory compliance is the set of activities an enterprise does to ensure that its core business does not violate relevant regulations, in the jurisdictions in which the business is situated, governing the (industry) sectors where the enterprise operates. In this paper the authors propose an ITC (Information and Communication Technology)...

    Provided By NICTA

  • White Papers // Aug 2013

    A Layered Secret Sharing Scheme and its Application to Online Social Networks

    The authors propose a novel multi-layer secret sharing scheme and its application to automate profile sharing in Online Social Network (OSN) groups. The scheme allows sharing of multiple secrets with arbitrary (and different) thresholds, while keeping both the number of secrets that are shared and their thresholds private. The scheme...

    Provided By NICTA

  • White Papers // Jun 2013

    An Abstract Normative Framework for Business Process Compliance

    In this paper, the authors presented an abstract framework to describe the key concepts of business process compliance. In particular, they provided a comprehensive classification of obligations and their semantics in terms of the execution traces of a process. The proposed model is neutral from specific logics for reasoning with...

    Provided By NICTA

  • White Papers // May 2013

    Real-Time Risk Monitoring in Business Processes: A Sensor-based Approach

    In this paper the authors propose an approach for real-time monitoring of risks in executable business process models. The approach considers risks in all phases of the business process management lifecycle, from process design, where risks are defined on top of process models, through to process diagnosis, where risks are...

    Provided By NICTA

  • White Papers // May 2013

    On the Effectiveness of Dynamic Taint Analysis for Protecting Against Private Information Leaks on Android-Based Devices

    The authors investigate the limitations of using dynamic taint analysis for tracking privacy-sensitive information on android-based mobile devices. Taint tracking keeps track of data as it propagates through variables, inter-process messages and files, by tagging them with taint marks. A popular taint-tracking system, TaintDroid, uses this approach in android mobile...

    Provided By NICTA

  • White Papers // Feb 2013

    A Practical Methodology for Cloud Services Evaluation

    Given an increasing number of cloud services available in the market, evaluating candidate cloud services is crucial and beneficial for both service customers (e.g. cost-benefit analysis) and providers (e.g. direction of improvement). When it comes to performing any evaluation, a suitable methodology is inevitably required to direct experimental implementations. Nevertheless,...

    Provided By NICTA

  • White Papers // Feb 2013

    A Factor Framework for Experimental Design for Performance Evaluation of Commercial Cloud Services

    Given the diversity of commercial Cloud services, performance evaluations of candidate services would be crucial and beneficial for both service customers (e.g. cost-benefit analysis) and providers (e.g. direction of service improvement). Before an evaluation implementation, the selection of suitable factors (also called parameters or variables) plays a prerequisite role in...

    Provided By NICTA

  • White Papers // Feb 2013

    Building an Expert System for Evaluation of Commercial Cloud Services

    Commercial Cloud services have been increasingly supplied to customers in industry. To facilitate customers' decision makings like cost-benefit analysis or Cloud provider selection, evaluation of those Cloud services are becoming more and more crucial. However, compared with evaluation of traditional computing systems, more challenges will inevitably appear when evaluating rapidly-changing...

    Provided By NICTA

  • White Papers // Sep 2012

    Noninterference for Operating System Kernels

    While intransitive non-interference is a natural property for any secure OS kernel to enforce, proving that the implementation of any particular general-purpose kernel enforces this property is yet to be achieved. In this paper the authors take a significant step towards this vision by presenting a machine-checked formulation of intransitive...

    Provided By NICTA

  • White Papers // Jul 2012

    Querying Process Models Repositories by Aggregated Graph Search

    Business process modeling is essential in any process improvement project. Yet, it is a time consuming and an error-prone step. With a rapidly increasing number of process models developed by different process designers, it becomes crucial for business process designers to reuse knowledge existing in model repositories, e.g., to find...

    Provided By NICTA

  • White Papers // Jun 2012

    On a Catalogue of Metrics for Evaluating Commercial Cloud Services

    Given the continually increasing amount of commercial Cloud services in the market, evaluation of different services plays a significant role in cost-benefit analysis or decision making for choosing Cloud Computing. In particular, employing suitable metrics is essential in evaluation implementations. However, to the best of the authors' knowledge, there is...

    Provided By NICTA

  • White Papers // Jun 2012

    Data Management Requirements for a Knowledge Discovery Platform

    In this paper the authors provide some requirements for the data management portion of a knowledge discovery ecosystem platform. The requirements are functional - what the platform should provide for its clients; quality - how the platform should support modifiability, performance, and availability; and management - how the platform supports...

    Provided By NICTA

  • White Papers // May 2012

    Memory and Complexity Analysis of On-theFly Coding Schemes for Multimedia Multicast Communications

    A new class of erasure codes for delay-constraint applications, called on-the-fly coding, have recently been introduced for their improvements in terms of recovery delay and achievable capacity. Despite their promising characteristics, little is known about the complexity of the systematic and non-systematic variants of this code, notably for live multicast...

    Provided By NICTA

  • White Papers // May 2012

    Bridging the Gap: Automatic Verified Abstraction of C

    Before low-level imperative code can be reasoned about in an interactive theorem prover, it must first be converted into a logical representation in that theorem prover. Accurate translations of such code should be conservative, choosing safe representations over representations convenient to reason about. This paper bridges the gap between conservative...

    Provided By NICTA

  • White Papers // May 2012

    Towards a Taxonomy of Performance Evaluation of Commercial Cloud Services

    Cloud Computing, as one of the most promising computing paradigms, has become increasingly accepted in industry. Numerous commercial providers have started to supply public Cloud services, and corresponding performance evaluation is then inevitably required for Cloud provider selection or cost-benefit analysis. Unfortunately, inaccurate and confusing evaluation implementations can be often...

    Provided By NICTA

  • White Papers // Feb 2012

    Is your Cloud Elastic Enough? Performance Modelling the Elasticity of Infrastructure as a Service (IaaS) Cloud Applications

    Elasticity, the ability to rapidly scale resources up and down on demand, is an essential feature of public cloud platforms. However, it is difficult to understand the elasticity requirements of a given application and workload, and if the elasticity provided by a cloud provider will meet those requirements. The authors...

    Provided By NICTA

  • White Papers // Aug 2011

    LegalRuleML: XML-Based Rules and Norms

    Legal texts are the foundational resource where to discover rules and norms that feed into different concrete (often XML-based) Web applications. Legislative documents provide general norms and specific procedural rules for e-government and e-commerce environments, while contracts specify the conditions of services and business rules (e.g. service level agreements for...

    Provided By NICTA

  • White Papers // Aug 2011

    Insecurity in Public-Safety Communications: APCO Project 25

    APCO Project 25 (P25) radio networks are perhaps the most widely-deployed digital radio technology currently in use by emergency first-responders across the world. This paper presents the results of an investigation into the security aspects of the P25 communication protocol. The investigation uses a new software-defined radio approach to expose...

    Provided By NICTA

  • White Papers // Aug 2011

    A Wireless Sensor Network Test-Bed for Structural Health Monitoring of Bridges

    The authors investigate the potential of wireless sensor networks to monitor the structural health of bridges. Needing to explore different sensing, networking, and distributed computing approaches in real conditions, they are led to the creation of an on-site testbed. In this paper, they describe the design and implementation of the...

    Provided By NICTA

  • White Papers // Jul 2011

    Energy-Efficient Retransmission Strategies Under Variable TDMA Scheduling in Body Area Networks

    The authors consider a Body Area Network (BAN) setting in which sensor nodes send data to a common hub regularly on a TDMA basis, as defined by the emerging IEEE 802.15.6 BAN standard. Their previous work has established the benefits of variable TDMA scheduling in this setting, where the order...

    Provided By NICTA

  • White Papers // Apr 2011

    Circumstantial-Evidence-Based Judgment for Software Effort Estimation

    Expert judgment for software effort estimation is oriented toward direct evidences that refer to actual effort of similar projects or activities through experts' experiences. However, the availability of direct evidences implies the requirement of suitable experts together with past data. The circumstantial-evidence-based judgment proposed in this paper focuses on the...

    Provided By NICTA

  • White Papers // Apr 2011

    MyDeepWeb: An Integration Service for your OWN Deep Web Data

    Current Web users usually have their own files, work documents, communications and personal contacts distributed in the storage systems of many widely-used Internet services (e.g. Google Docs, Gmail, Facebook and Zoho). Therefore, they face the challenge of being not able to have an integrated view for their related data objects...

    Provided By NICTA

  • White Papers // Apr 2011

    What if You Could Actually Trust Your Kernel?

    The advent of formally verified OS kernels means that for the first time the authors have a truly trustworthy foundation for systems. In this paper, they explore the design space this opens up. The obvious applications are in security, although not all of them are quite as obvious, for example...

    Provided By NICTA

  • White Papers // Feb 2011

    seL4 Enforces Integrity

    The authors prove the enforcement of two high-level access control properties in the seL4 microkernel: integrity and authority confinement. Integrity provides an upper bound on write operations. Authority confinement provides an upper bound on how authority may change. Apart from being a desirable security property in its own right, integrity...

    Provided By NICTA

  • White Papers // Jan 2011

    CloudDB AutoAdmin: Towards a Truly Elastic Cloud-Based Data Store

    Database-as-a-Service (DaaS) is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data management for its customers and thus alleviates the need for the service user to purchase expensive hardware and software, deal with software upgrades and...

    Provided By NICTA

  • White Papers // Jan 2011

    On the Feasibility of Utilizing Correlations Between User Populations for Traffic Inference

    Network models today are often derived from two different methods. On one hand, detailed traffic models are generated based on traces from a single tap into the network. Alternatively, one can collect higher-level traffic-matrix data with SNMP from many routers. However, inferring flow-level details from such data is still an...

    Provided By NICTA

  • White Papers // Jan 2011

    Data Consistency Properties and the Trade Offs in Commercial Cloud Storages: the Consumers' Perspective

    A new class of data storage systems, called NoSQL (Not only SQL), has emerged to complement traditional database systems, with rejection of general ACID transactions as one common feature. Different platforms, and indeed different primitives within one NoSQL platform, can offer various consistency properties, from Eventual Consistency to single-entity ACID....

    Provided By NICTA

  • White Papers // Dec 2010

    Cloud Computing Adoption Risks: State of Play

    While much-hyped, cloud computing offers early adopters potentially significant benefits. However, important barriers to adoption have also been identified. This paper canvasses and discusses the 'State of play' of cloud computing risks. The paper reviews and compares 'State of practice' views on cloud computing adoption risks with 'State of art'...

    Provided By NICTA

  • White Papers // Nov 2010

    Performance and Cost Assessment of Cloud Services

    Architecting applications for the Cloud is challenging due to significant differences between traditional hosting and Cloud infrastructure setup, unknown and unproven Cloud performance and scalability characteristics, as well as variable quota limitations. Building workable cloud applications therefore requires in-depth insight into the architectural and performance characteristics of each cloud offering,...

    Provided By NICTA

  • White Papers // Oct 2010

    An Overview of the DSRC/WAVE Technology

    Wireless vehicular networks operating on the Dedicated Short-Range Communications (DSRC) frequency bands are the key enabling technologies for the emerging market of Intelligent Transport System (ITS). The Wireless Access in Vehicular Environments (WAVE) is significantly different from the Wi-Fi and cellular wireless networking environments. The specifications defined by IEEE802.11P and...

    Provided By NICTA

  • White Papers // Oct 2010

    A Packet Error Recovery Scheme for Vertical Handovers Mobility Management Protocols

    Mobile devices are connecting to the Internet through an increasingly heterogeneous network environment. This connectivity via multiple types of wireless networks allows the mobile devices to take advantage of the high speed and the low cost of wireless local area networks and the large coverage of wireless wide area networks....

    Provided By NICTA

  • White Papers // Oct 2010

    From a Proven Correct Microkernel to Trustworthy Large Systems

    The seL4 microkernel was the world's first general-purpose operating system kernel with a formal, machine-checked proof of correctness. The next big step in the challenge of building truly trustworthy systems is to provide a framework for developing secure systems on top of seL4. This paper first gives an overview of...

    Provided By NICTA

  • White Papers // Aug 2010

    Towards Proving Security in the Presence of Large Untrusted Components

    This paper proposes a generalized framework to build large, complex systems where security guarantees can be given for the overall systems implementation. The paper builds on the formally proven correct seL4 microkernel and on its fine-grained access control. This access control mechanism allows large untrusted components to be isolated in...

    Provided By NICTA

  • White Papers // Jun 2010

    Safetynet Version 2, a Packet Error Recovery Architecture for Vertical Handoffs

    Mobile devices are connecting to the Internet through an increasingly heterogeneous network environment. This connectivity via multiple types of wireless networks allows the mobile devices to take advantage of the high speed and the low cost of wireless local area networks and the large coverage of wireless wide area networks....

    Provided By NICTA

  • White Papers // Jun 2010

    Quantitative Analysis for Non-linear System Performance Data using Case-based Reasoning

    The effective software architecture evaluation methods are essential in today's system development for mission critical systems. The authors have previously developed MEMS and a set of test statistics for evaluating middleware architectures, which proven an effective assessment of important quality attributes and their characterizations. They have observed it is common...

    Provided By NICTA

  • White Papers // Mar 2010

    The Insecurity of Time-of-Arrival Distance-Ranging in IEEE 802.11 Wireless Networks

    Two-way Time-Of-Arrival (TOA) distance-ranging is well-suited for use in IEEE 802.11 MANETs and wireless mesh networks because it is simple, efficient and does not require precise time synchronization between network stations. Despite its utility the authors show that this distance-ranging procedure is completely insecure and demonstrate how it can be...

    Provided By NICTA

  • White Papers // Mar 2010

    Modeling Cloud Cost and Performance

    Architecting applications for the Cloud is challenging due to significant differences between traditional hosting and Cloud infrastructure setup, unknown and unproven Cloud performance and scalability characteristics, and unpredictable availability as well as variable quota limitations. Clouds claim to offer benefits in terms of cost and elasticity under some situations, but...

    Provided By NICTA

  • White Papers // Jan 2010

    High Performance Peer-to-Peer Distributed Computing With Application to Obstacle Problem

    This paper deals with high performance Peer-to-Peer computing applications. The authors concentrate on the solution of large scale numerical simulation problems via distributed iterative methods. They present the current version of an environment that allows direct communication between peers. This environment is based on a self-adaptive communication protocol. The protocol...

    Provided By NICTA

  • White Papers // Dec 2009

    Experiences and Lessons From Implementing a Wireless Sensor Network MAC Protocol in the Castalia Simulator

    The authors describe their experience from the implementation of the T-MAC protocol for wireless sensor networks in the open-source Castalia simulator. Notwithstanding the popularity of the protocol in the research literature in recent years, they find several practical issues that are not addressed in the original protocol description, which lead...

    Provided By NICTA

  • White Papers // Feb 2013

    A Factor Framework for Experimental Design for Performance Evaluation of Commercial Cloud Services

    Given the diversity of commercial Cloud services, performance evaluations of candidate services would be crucial and beneficial for both service customers (e.g. cost-benefit analysis) and providers (e.g. direction of service improvement). Before an evaluation implementation, the selection of suitable factors (also called parameters or variables) plays a prerequisite role in...

    Provided By NICTA

  • White Papers // Feb 2013

    Building an Expert System for Evaluation of Commercial Cloud Services

    Commercial Cloud services have been increasingly supplied to customers in industry. To facilitate customers' decision makings like cost-benefit analysis or Cloud provider selection, evaluation of those Cloud services are becoming more and more crucial. However, compared with evaluation of traditional computing systems, more challenges will inevitably appear when evaluating rapidly-changing...

    Provided By NICTA

  • White Papers // May 2012

    Towards a Taxonomy of Performance Evaluation of Commercial Cloud Services

    Cloud Computing, as one of the most promising computing paradigms, has become increasingly accepted in industry. Numerous commercial providers have started to supply public Cloud services, and corresponding performance evaluation is then inevitably required for Cloud provider selection or cost-benefit analysis. Unfortunately, inaccurate and confusing evaluation implementations can be often...

    Provided By NICTA

  • White Papers // Jun 2012

    On a Catalogue of Metrics for Evaluating Commercial Cloud Services

    Given the continually increasing amount of commercial Cloud services in the market, evaluation of different services plays a significant role in cost-benefit analysis or decision making for choosing Cloud Computing. In particular, employing suitable metrics is essential in evaluation implementations. However, to the best of the authors' knowledge, there is...

    Provided By NICTA

  • White Papers // Dec 2010

    Cloud Computing Adoption Risks: State of Play

    While much-hyped, cloud computing offers early adopters potentially significant benefits. However, important barriers to adoption have also been identified. This paper canvasses and discusses the 'State of play' of cloud computing risks. The paper reviews and compares 'State of practice' views on cloud computing adoption risks with 'State of art'...

    Provided By NICTA

  • White Papers // Mar 2010

    Modeling Cloud Cost and Performance

    Architecting applications for the Cloud is challenging due to significant differences between traditional hosting and Cloud infrastructure setup, unknown and unproven Cloud performance and scalability characteristics, and unpredictable availability as well as variable quota limitations. Clouds claim to offer benefits in terms of cost and elasticity under some situations, but...

    Provided By NICTA

  • White Papers // Jul 2009

    Performance Modelling Power Consumption and Carbon Emissions for Server Virtualization of Service Oriented Architectures (SOAs)

    Server Virtualization is driven by the goal of reducing the total number of physical servers in an organisation by consolidating multiple applications on shared servers. Expected benefits include more efficient server utilisation, and a decrease in green house gas emissions. However, Service Oriented Architectures combined with Server Virtualization may significantly...

    Provided By NICTA

  • White Papers // Aug 2011

    A Wireless Sensor Network Test-Bed for Structural Health Monitoring of Bridges

    The authors investigate the potential of wireless sensor networks to monitor the structural health of bridges. Needing to explore different sensing, networking, and distributed computing approaches in real conditions, they are led to the creation of an on-site testbed. In this paper, they describe the design and implementation of the...

    Provided By NICTA

  • White Papers // Jul 2011

    Energy-Efficient Retransmission Strategies Under Variable TDMA Scheduling in Body Area Networks

    The authors consider a Body Area Network (BAN) setting in which sensor nodes send data to a common hub regularly on a TDMA basis, as defined by the emerging IEEE 802.15.6 BAN standard. Their previous work has established the benefits of variable TDMA scheduling in this setting, where the order...

    Provided By NICTA

  • White Papers // Aug 2011

    Insecurity in Public-Safety Communications: APCO Project 25

    APCO Project 25 (P25) radio networks are perhaps the most widely-deployed digital radio technology currently in use by emergency first-responders across the world. This paper presents the results of an investigation into the security aspects of the P25 communication protocol. The investigation uses a new software-defined radio approach to expose...

    Provided By NICTA

  • White Papers // Oct 2010

    A Packet Error Recovery Scheme for Vertical Handovers Mobility Management Protocols

    Mobile devices are connecting to the Internet through an increasingly heterogeneous network environment. This connectivity via multiple types of wireless networks allows the mobile devices to take advantage of the high speed and the low cost of wireless local area networks and the large coverage of wireless wide area networks....

    Provided By NICTA

  • White Papers // Oct 2010

    An Overview of the DSRC/WAVE Technology

    Wireless vehicular networks operating on the Dedicated Short-Range Communications (DSRC) frequency bands are the key enabling technologies for the emerging market of Intelligent Transport System (ITS). The Wireless Access in Vehicular Environments (WAVE) is significantly different from the Wi-Fi and cellular wireless networking environments. The specifications defined by IEEE802.11P and...

    Provided By NICTA

  • White Papers // Jun 2010

    Safetynet Version 2, a Packet Error Recovery Architecture for Vertical Handoffs

    Mobile devices are connecting to the Internet through an increasingly heterogeneous network environment. This connectivity via multiple types of wireless networks allows the mobile devices to take advantage of the high speed and the low cost of wireless local area networks and the large coverage of wireless wide area networks....

    Provided By NICTA

  • White Papers // Mar 2010

    The Insecurity of Time-of-Arrival Distance-Ranging in IEEE 802.11 Wireless Networks

    Two-way Time-Of-Arrival (TOA) distance-ranging is well-suited for use in IEEE 802.11 MANETs and wireless mesh networks because it is simple, efficient and does not require precise time synchronization between network stations. Despite its utility the authors show that this distance-ranging procedure is completely insecure and demonstrate how it can be...

    Provided By NICTA

  • White Papers // Dec 2009

    Experiences and Lessons From Implementing a Wireless Sensor Network MAC Protocol in the Castalia Simulator

    The authors describe their experience from the implementation of the T-MAC protocol for wireless sensor networks in the open-source Castalia simulator. Notwithstanding the popularity of the protocol in the research literature in recent years, they find several practical issues that are not addressed in the original protocol description, which lead...

    Provided By NICTA

  • White Papers // Sep 2009

    Dynamic Narrowband Body Area Communications: Link-Margin Based Performance Analysis and Second-Order Temporal Statistics

    A dynamic narrowband on-body area communications scenario is characterized with respect to link margin as a difference between systems operating point, in terms of receive power, and receiver sensitivity. The characterization is based on an extensive measurement campaign near the 900 MHz ISM bands, with a number of different human...

    Provided By NICTA

  • White Papers // Jul 2009

    A Hybrid Integer Carrier Frequency Offset Estimator for Practical OFDM Systems

    In Orthogonal Frequency-Division Multiplexing (OFDM) systems, the integer part of Carrier Frequency Offset (CFO) as a multiple of subcarrier spacing needs to be estimated from the frequency-domain signal. The performance of the autocorrelation based method is quite poor, while the channel knowledge based method is too complex for hardware real-time...

    Provided By NICTA

  • White Papers // Jul 2009

    Wireless Sensor Network Tesbed for Structural Health Monitoring of Bridges

    The Road and Traffic Authority (RTA) of NSW, Australia, partnered with NICTA, are looking into wireless sensor network technologies to monitor the structural health of bridges. The task involves exploring different sensing, networking, and distributed computation approaches for the specific application of Structural Health Monitoring (SHM). The exploration has to...

    Provided By NICTA

  • White Papers // Jun 2009

    MOBIX: System for Managing MOBility Using Information EXchange

    It is evident that mobile devices of the future will have multiple wireless interfaces. For small, energy-constrained devices, determining network availability by keeping all radio interfaces turned on at all times will negatively impact battery lifetime even when these interfaces are idle. Predicting future network availability from user history requires...

    Provided By NICTA

  • White Papers // Mar 2009

    EMUNE: Architecture for Effective Mobile Usage of Heterogeneous Networks

    With the mobile communication market increasingly moving towards value-added services the network cost will need to be included in the service offering itself. This will lead service providers to optimize network usage based on real cost rather than the simplified network plans sold to consumers traditionally. Meanwhile, today's mobile devices...

    Provided By NICTA

  • White Papers // Jan 2010

    High Performance Peer-to-Peer Distributed Computing With Application to Obstacle Problem

    This paper deals with high performance Peer-to-Peer computing applications. The authors concentrate on the solution of large scale numerical simulation problems via distributed iterative methods. They present the current version of an environment that allows direct communication between peers. This environment is based on a self-adaptive communication protocol. The protocol...

    Provided By NICTA

  • White Papers // Nov 2009

    OMF: A Control and Management Framework for Networking Testbeds

    Networking testbeds are playing an increasingly important role in the development of new communication technologies. Testbeds are traditionally built for a particular project or to study a specific technology. An alternative approach is to federate existing testbeds to cater for experimenter needs which cannot be fulfilled by a single testbed,...

    Provided By NICTA

  • White Papers // Oct 2009

    Models for an Energy-Efficient P2P Delivery Service

    Data and service delivery have been historically based on "Network centric" architectures, with datacentres being the focal sources. The amount of energy consumed by these datacentres has become an emerging issue for the companies operating them. Thus, many contributions propose solutions to improve the current datacentre architecture and deployments to...

    Provided By NICTA

  • White Papers // May 2009

    Circuit Complexity and Decompositions of Global Constraints

    The authors show that tools from circuit complexity can be used to study decompositions of global constraints. In particular, the authors study decompositions of global constraints into conjunctive normal form with the property that unit propagation on the decomposition enforces the same level of consistency as a specialized propagation algorithm....

    Provided By NICTA

  • White Papers // Sep 2009

    Elicitation Strategies for Fuzzy Constraint Problems With Missing Preferences: Algorithms and Experimental Studies

    Fuzzy constraints are a popular approach to handle preferences and over-constrained problems in scenarios where one needs to be cautious, such as in medical or space applications. The authors consider here fuzzy constraint problems where some of the preferences may be missing. This models, for example, settings where agents are...

    Provided By NICTA

  • White Papers // Feb 2011

    seL4 Enforces Integrity

    The authors prove the enforcement of two high-level access control properties in the seL4 microkernel: integrity and authority confinement. Integrity provides an upper bound on write operations. Authority confinement provides an upper bound on how authority may change. Apart from being a desirable security property in its own right, integrity...

    Provided By NICTA

  • White Papers // Apr 2011

    Circumstantial-Evidence-Based Judgment for Software Effort Estimation

    Expert judgment for software effort estimation is oriented toward direct evidences that refer to actual effort of similar projects or activities through experts' experiences. However, the availability of direct evidences implies the requirement of suitable experts together with past data. The circumstantial-evidence-based judgment proposed in this paper focuses on the...

    Provided By NICTA

  • White Papers // Aug 2010

    Towards Proving Security in the Presence of Large Untrusted Components

    This paper proposes a generalized framework to build large, complex systems where security guarantees can be given for the overall systems implementation. The paper builds on the formally proven correct seL4 microkernel and on its fine-grained access control. This access control mechanism allows large untrusted components to be isolated in...

    Provided By NICTA

  • White Papers // Jan 2011

    On the Feasibility of Utilizing Correlations Between User Populations for Traffic Inference

    Network models today are often derived from two different methods. On one hand, detailed traffic models are generated based on traces from a single tap into the network. Alternatively, one can collect higher-level traffic-matrix data with SNMP from many routers. However, inferring flow-level details from such data is still an...

    Provided By NICTA

  • White Papers // Jan 2011

    Data Consistency Properties and the Trade Offs in Commercial Cloud Storages: the Consumers' Perspective

    A new class of data storage systems, called NoSQL (Not only SQL), has emerged to complement traditional database systems, with rejection of general ACID transactions as one common feature. Different platforms, and indeed different primitives within one NoSQL platform, can offer various consistency properties, from Eventual Consistency to single-entity ACID....

    Provided By NICTA

  • White Papers // Nov 2010

    Performance and Cost Assessment of Cloud Services

    Architecting applications for the Cloud is challenging due to significant differences between traditional hosting and Cloud infrastructure setup, unknown and unproven Cloud performance and scalability characteristics, as well as variable quota limitations. Building workable cloud applications therefore requires in-depth insight into the architectural and performance characteristics of each cloud offering,...

    Provided By NICTA

  • White Papers // May 2012

    Bridging the Gap: Automatic Verified Abstraction of C

    Before low-level imperative code can be reasoned about in an interactive theorem prover, it must first be converted into a logical representation in that theorem prover. Accurate translations of such code should be conservative, choosing safe representations over representations convenient to reason about. This paper bridges the gap between conservative...

    Provided By NICTA

  • White Papers // May 2012

    Memory and Complexity Analysis of On-theFly Coding Schemes for Multimedia Multicast Communications

    A new class of erasure codes for delay-constraint applications, called on-the-fly coding, have recently been introduced for their improvements in terms of recovery delay and achievable capacity. Despite their promising characteristics, little is known about the complexity of the systematic and non-systematic variants of this code, notably for live multicast...

    Provided By NICTA

  • White Papers // Oct 2010

    From a Proven Correct Microkernel to Trustworthy Large Systems

    The seL4 microkernel was the world's first general-purpose operating system kernel with a formal, machine-checked proof of correctness. The next big step in the challenge of building truly trustworthy systems is to provide a framework for developing secure systems on top of seL4. This paper first gives an overview of...

    Provided By NICTA

  • White Papers // Sep 2012

    Noninterference for Operating System Kernels

    While intransitive non-interference is a natural property for any secure OS kernel to enforce, proving that the implementation of any particular general-purpose kernel enforces this property is yet to be achieved. In this paper the authors take a significant step towards this vision by presenting a machine-checked formulation of intransitive...

    Provided By NICTA

  • White Papers // Jun 2012

    Data Management Requirements for a Knowledge Discovery Platform

    In this paper the authors provide some requirements for the data management portion of a knowledge discovery ecosystem platform. The requirements are functional - what the platform should provide for its clients; quality - how the platform should support modifiability, performance, and availability; and management - how the platform supports...

    Provided By NICTA

  • White Papers // Feb 2012

    Is your Cloud Elastic Enough? Performance Modelling the Elasticity of Infrastructure as a Service (IaaS) Cloud Applications

    Elasticity, the ability to rapidly scale resources up and down on demand, is an essential feature of public cloud platforms. However, it is difficult to understand the elasticity requirements of a given application and workload, and if the elasticity provided by a cloud provider will meet those requirements. The authors...

    Provided By NICTA

  • White Papers // Nov 2013

    ICT Support for Regulatory Compliance of Business Processes

    Regulatory compliance is the set of activities an enterprise does to ensure that its core business does not violate relevant regulations, in the jurisdictions in which the business is situated, governing the (industry) sectors where the enterprise operates. In this paper the authors propose an ITC (Information and Communication Technology)...

    Provided By NICTA

  • White Papers // May 2013

    Real-Time Risk Monitoring in Business Processes: A Sensor-based Approach

    In this paper the authors propose an approach for real-time monitoring of risks in executable business process models. The approach considers risks in all phases of the business process management lifecycle, from process design, where risks are defined on top of process models, through to process diagnosis, where risks are...

    Provided By NICTA

  • White Papers // Feb 2013

    A Practical Methodology for Cloud Services Evaluation

    Given an increasing number of cloud services available in the market, evaluating candidate cloud services is crucial and beneficial for both service customers (e.g. cost-benefit analysis) and providers (e.g. direction of improvement). When it comes to performing any evaluation, a suitable methodology is inevitably required to direct experimental implementations. Nevertheless,...

    Provided By NICTA