Open University

Displaying 1-24 of 24 results

  • White Papers // May 2013

    Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm

    Traversal Time and Hop Count Analysis (TTHCA) is a recent wormhole detection algorithm for Mobile Ad-hoc NETworks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering...

    Provided By Open University

  • White Papers // May 2013

    A New Method for the Identification of Proactive Information Security Management System Metrics

    Information security is topic of everyday interest, with mainstream media reports revealing information security incidents in many different areas. These reports demonstrate the importance to any organization of having an Information Security Management System (ISMS). Foreseeing potential security risks is usually key to successful risk management. Available information security standards...

    Provided By Open University

  • White Papers // Dec 2012

    Cloud Services within a ROLE-Enabled Personal Learning Environment

    The ROLE project (Responsive Open Learning Environments) is focused on the next generation of Personal Learning Environments (PLE). In this paper, the authors describe the engineering process used to create either a new widget bundle, a group of applications or service widgets. The widgets integrated in a ROLE PLE consist...

    Provided By Open University

  • White Papers // Oct 2012

    The Business Process Modelling Ontology

    In this paper, the authors describe the Business Process Modelling Ontology (BPMO), which is part of an approach to modelling business processes at the semantic level, integrating knowledge about the organizational context, workflow activities and Semantic Web Services. They harness knowledge representation and reasoning techniques so that business process workflows...

    Provided By Open University

  • White Papers // Oct 2012

    Semantic Business Process Management: Scaling up the Management of Business Processes

    Business Process Management (BPM) aims at supporting the whole life-cycle necessary to deploy and maintain business processes in organizations. Despite its success however, BPM suffers from a lack of automation that would support a smooth transition between the business world and the IT world. The authors argue that Semantic BPM,...

    Provided By Open University

  • White Papers // Apr 2012

    Using WS-BPEL for Automation of Semantic Web Service Tools Evaluation

    Although a significant number of semantic tools have been produced, there exists a shortage of approaches that allow tools benchmarking in an automatic way. This paper presents an approach for automation of Semantic Web Service (SWS) tools evaluation by means of WS-BPEL based Web services using the infrastructure provided by...

    Provided By Open University

  • White Papers // Apr 2012

    An Interference-Aware Virtual Clustering Paradigm for Resource Management in Cognitive Femtocell Networks

    Femtocells represent a promising alternative solution for high quality wireless access in indoor scenarios where conventional cellular system coverage can be poor. Femtocell Access Points (FAP) are normally randomly deployed by the end user, so only post deployment network planning is possible. Furthermore, this uncoordinated deployment creates the potential for...

    Provided By Open University

  • White Papers // Nov 2011

    A New MANET Wormhole Detection Algorithm Based on Traversal Time and Hop Count Analysis

    As demand increases for ubiquitous network facilities, infrastructure-less and self-configuring systems like Mobile Ad-hoc NETworks (MANET) are gaining popularity. MANET routing security however, is one of the most significant challenges to wide scale adoption, with wormhole attacks being an especially severe MANET routing threat. This is because wormholes are able...

    Provided By Open University

  • White Papers // Dec 2010

    The Diffusion of e-Commerce in UK SMEs

    The concept of the Internet as a cluster of related innovations, along with the staged approach to organizational learning exhibited by SMEs in other domains, suggest that ecommerce is likely to be adopted in a sequence of stages. This exploratory survey, carried out by means of a postal questionnaire with...

    Provided By Open University

  • White Papers // Dec 2010

    Linked Services and the Future Internet

    It has often been argued that Web services would have a tremendous impact on the Internet, as a core enabling technology supporting a highly efficient service-based economy at a global scale. However, despite the outstanding progress in the area the authors are still to witness this impact. In this paper,...

    Provided By Open University

  • White Papers // Dec 2010

    Requirements-Driven Design and Configuration Management of Business Processes

    The success of a Business Process (BP) depends on whether it meets its business goal as well as non-functional requirements associated with it. BP specifications frequently need to accommodate changing business priorities, varying client preferences, etc. However, since business process goals and preferences are rarely captured explicitly in the dominant...

    Provided By Open University

  • White Papers // Dec 2010

    A Core Ontology for Business Process Analysis

    Business Process Management (BPM) aims at supporting the whole life-cycle necessary to deploy and maintain business processes in organizations. An important step of the BPM life-cycle is the analysis of the processes deployed in companies. However, the degree of automation currently achieved cannot support the level of adaptation required by...

    Provided By Open University

  • White Papers // May 2010

    RDF and XML: Towards a Unified Query Layer

    One of the requirements of current Semantic Web applications is to deal with heterogeneous data. The Resource Description Framework (RDF) is the W3C recommended standard for data representation, yet data represented and stored using the EXtensible Markup Language (XML) is almost ubiquitous and remains the standard for data exchange. While...

    Provided By Open University

  • White Papers // May 2010

    From XML to XML: The Why and How of Making the Biodiversity Literature Accessible to Researchers

    This paper presents the ABLE document collection, which consists of a set of annotated volumes of the Bulletin of the British Museum (Natural History). These were developed during the ongoing work on automating the markup of scanned copies of the biodiversity literature. Such automation is required if historic literature is...

    Provided By Open University

  • White Papers // Oct 2009

    Translating Semantic Web Service Based Business Process Models

    The authors describe a model-driven translation approach between Semantic Web Service based business process models in the context of the SUPER project. In SUPER they provide a set of business process ontologies for enabling access to the business process space inside the organization at the semantic level. One major task...

    Provided By Open University

  • White Papers // Sep 2009

    Reflection Support Using Multi-Encoded Tag-Clouds

    In this paper, the authors report on a qualitative study about the application of tag clouds for supporting meta-cognition in self-directed and incidental learning. It analyses the use of a personal tag-cloud visualization of the tags that are used at a public social bookmarking service. The paper focuses at the...

    Provided By Open University

  • White Papers // May 2009

    Towards Safer Composition

    Determining whether a set of features can be composed, or safe composition, is a hard problem in software product line engineering because the number of feature combinations can be exponential. The authors argue that synergies between current approaches to safe composition should be exploited and propose a combined approach. At...

    Provided By Open University

  • White Papers // May 2009

    Enhancing Telecommunication Business Process Representation and Integration with Ontologised Industry Standards

    This paper shows how semantic technologies can be used in combination with industry standards to pursue the goal of business domain driven Business Process Management. The authors show how semantic technologies used in modelling core work flow elements of Business Process Models can be used to bootstrap the operationalisation of...

    Provided By Open University

  • White Papers // Apr 2009

    Towards Data Fusion in a Multi-ontology Environment

    With the growing amount of semantic data being published on the Web the problem of finding individuals in different datasets which correspond to the same entity is gaining importance. Given that datasets are often structured using different ontologies, automatic schema-matching techniques have to be utilized before proceeding with data-level alignment....

    Provided By Open University

  • White Papers // Feb 2009

    Strategy-driven Business Process Analysis

    Business Process Analysis (BPA) aims to verify, validate, and identify potential improvements for business processes. Despite the wide range of technologies developed so far, the large amount of information that needs to be integrated and processed, as well as the quantity of data that has to be produced and presented...

    Provided By Open University

  • White Papers // Dec 2008

    Security and Dependability Engineering

    The current state of the art in security-critical ambient systems is far from satisfactory: new security vulnerabilities are discovered on an almost daily basis. To improve this situation, there has recently been a lot of work on techniques and tools supporting the development of trustworthy security-critical software, in particular for...

    Provided By Open University

  • White Papers // Nov 2008

    Model-Based Quality Assurance of Automotive Software

    Software in embedded (e.g. automotive) systems requires a high level of reliability. Model-based development techniques are increasingly used to reach this goal, but so far there is relatively little published knowledge on the comparative benefits in using different assurance techniques. The authors investigate different and potentially complementary model-based software quality...

    Provided By Open University

  • White Papers // Sep 2008

    IT Security Risk Analysis Based on Business Process Models Enhanced with Security Requirements

    Traditional risk analysis approaches are based on events, probabilities and impacts. They are complex, time-consuming, and costly, and have limitations regarding the data and assessment quality: first, security events have to be identified often without much methodological guidance, making the process prone to errors and omissions. Second, concrete probability values...

    Provided By Open University

  • White Papers // Apr 2007

    Towards an Ontology for Process Monitoring and Mining

    Business Process Analysis (BPA) aims at monitoring, diagnosing, simulating and mining enacted processes in order to support the analysis and enhancement of process models. An effective BPA solution must provide the means for analyzing existing e-businesses at three levels of abstraction: the Business Level, the Process Level and the IT...

    Provided By Open University

  • White Papers // May 2010

    From XML to XML: The Why and How of Making the Biodiversity Literature Accessible to Researchers

    This paper presents the ABLE document collection, which consists of a set of annotated volumes of the Bulletin of the British Museum (Natural History). These were developed during the ongoing work on automating the markup of scanned copies of the biodiversity literature. Such automation is required if historic literature is...

    Provided By Open University

  • White Papers // Apr 2009

    Towards Data Fusion in a Multi-ontology Environment

    With the growing amount of semantic data being published on the Web the problem of finding individuals in different datasets which correspond to the same entity is gaining importance. Given that datasets are often structured using different ontologies, automatic schema-matching techniques have to be utilized before proceeding with data-level alignment....

    Provided By Open University

  • White Papers // May 2009

    Towards Safer Composition

    Determining whether a set of features can be composed, or safe composition, is a hard problem in software product line engineering because the number of feature combinations can be exponential. The authors argue that synergies between current approaches to safe composition should be exploited and propose a combined approach. At...

    Provided By Open University

  • White Papers // May 2010

    RDF and XML: Towards a Unified Query Layer

    One of the requirements of current Semantic Web applications is to deal with heterogeneous data. The Resource Description Framework (RDF) is the W3C recommended standard for data representation, yet data represented and stored using the EXtensible Markup Language (XML) is almost ubiquitous and remains the standard for data exchange. While...

    Provided By Open University

  • White Papers // Dec 2010

    Linked Services and the Future Internet

    It has often been argued that Web services would have a tremendous impact on the Internet, as a core enabling technology supporting a highly efficient service-based economy at a global scale. However, despite the outstanding progress in the area the authors are still to witness this impact. In this paper,...

    Provided By Open University

  • White Papers // Dec 2010

    The Diffusion of e-Commerce in UK SMEs

    The concept of the Internet as a cluster of related innovations, along with the staged approach to organizational learning exhibited by SMEs in other domains, suggest that ecommerce is likely to be adopted in a sequence of stages. This exploratory survey, carried out by means of a postal questionnaire with...

    Provided By Open University

  • White Papers // Dec 2008

    Security and Dependability Engineering

    The current state of the art in security-critical ambient systems is far from satisfactory: new security vulnerabilities are discovered on an almost daily basis. To improve this situation, there has recently been a lot of work on techniques and tools supporting the development of trustworthy security-critical software, in particular for...

    Provided By Open University

  • White Papers // Nov 2008

    Model-Based Quality Assurance of Automotive Software

    Software in embedded (e.g. automotive) systems requires a high level of reliability. Model-based development techniques are increasingly used to reach this goal, but so far there is relatively little published knowledge on the comparative benefits in using different assurance techniques. The authors investigate different and potentially complementary model-based software quality...

    Provided By Open University

  • White Papers // Apr 2012

    An Interference-Aware Virtual Clustering Paradigm for Resource Management in Cognitive Femtocell Networks

    Femtocells represent a promising alternative solution for high quality wireless access in indoor scenarios where conventional cellular system coverage can be poor. Femtocell Access Points (FAP) are normally randomly deployed by the end user, so only post deployment network planning is possible. Furthermore, this uncoordinated deployment creates the potential for...

    Provided By Open University

  • White Papers // Nov 2011

    A New MANET Wormhole Detection Algorithm Based on Traversal Time and Hop Count Analysis

    As demand increases for ubiquitous network facilities, infrastructure-less and self-configuring systems like Mobile Ad-hoc NETworks (MANET) are gaining popularity. MANET routing security however, is one of the most significant challenges to wide scale adoption, with wormhole attacks being an especially severe MANET routing threat. This is because wormholes are able...

    Provided By Open University

  • White Papers // May 2013

    A New Method for the Identification of Proactive Information Security Management System Metrics

    Information security is topic of everyday interest, with mainstream media reports revealing information security incidents in many different areas. These reports demonstrate the importance to any organization of having an Information Security Management System (ISMS). Foreseeing potential security risks is usually key to successful risk management. Available information security standards...

    Provided By Open University

  • White Papers // Dec 2012

    Cloud Services within a ROLE-Enabled Personal Learning Environment

    The ROLE project (Responsive Open Learning Environments) is focused on the next generation of Personal Learning Environments (PLE). In this paper, the authors describe the engineering process used to create either a new widget bundle, a group of applications or service widgets. The widgets integrated in a ROLE PLE consist...

    Provided By Open University

  • White Papers // Sep 2009

    Reflection Support Using Multi-Encoded Tag-Clouds

    In this paper, the authors report on a qualitative study about the application of tag clouds for supporting meta-cognition in self-directed and incidental learning. It analyses the use of a personal tag-cloud visualization of the tags that are used at a public social bookmarking service. The paper focuses at the...

    Provided By Open University

  • White Papers // Sep 2008

    IT Security Risk Analysis Based on Business Process Models Enhanced with Security Requirements

    Traditional risk analysis approaches are based on events, probabilities and impacts. They are complex, time-consuming, and costly, and have limitations regarding the data and assessment quality: first, security events have to be identified often without much methodological guidance, making the process prone to errors and omissions. Second, concrete probability values...

    Provided By Open University

  • White Papers // Oct 2012

    The Business Process Modelling Ontology

    In this paper, the authors describe the Business Process Modelling Ontology (BPMO), which is part of an approach to modelling business processes at the semantic level, integrating knowledge about the organizational context, workflow activities and Semantic Web Services. They harness knowledge representation and reasoning techniques so that business process workflows...

    Provided By Open University

  • White Papers // Oct 2009

    Translating Semantic Web Service Based Business Process Models

    The authors describe a model-driven translation approach between Semantic Web Service based business process models in the context of the SUPER project. In SUPER they provide a set of business process ontologies for enabling access to the business process space inside the organization at the semantic level. One major task...

    Provided By Open University

  • White Papers // Oct 2012

    Semantic Business Process Management: Scaling up the Management of Business Processes

    Business Process Management (BPM) aims at supporting the whole life-cycle necessary to deploy and maintain business processes in organizations. Despite its success however, BPM suffers from a lack of automation that would support a smooth transition between the business world and the IT world. The authors argue that Semantic BPM,...

    Provided By Open University

  • White Papers // Dec 2010

    A Core Ontology for Business Process Analysis

    Business Process Management (BPM) aims at supporting the whole life-cycle necessary to deploy and maintain business processes in organizations. An important step of the BPM life-cycle is the analysis of the processes deployed in companies. However, the degree of automation currently achieved cannot support the level of adaptation required by...

    Provided By Open University

  • White Papers // Dec 2010

    Requirements-Driven Design and Configuration Management of Business Processes

    The success of a Business Process (BP) depends on whether it meets its business goal as well as non-functional requirements associated with it. BP specifications frequently need to accommodate changing business priorities, varying client preferences, etc. However, since business process goals and preferences are rarely captured explicitly in the dominant...

    Provided By Open University

  • White Papers // May 2013

    Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm

    Traversal Time and Hop Count Analysis (TTHCA) is a recent wormhole detection algorithm for Mobile Ad-hoc NETworks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering...

    Provided By Open University

  • White Papers // Apr 2012

    Using WS-BPEL for Automation of Semantic Web Service Tools Evaluation

    Although a significant number of semantic tools have been produced, there exists a shortage of approaches that allow tools benchmarking in an automatic way. This paper presents an approach for automation of Semantic Web Service (SWS) tools evaluation by means of WS-BPEL based Web services using the infrastructure provided by...

    Provided By Open University

  • White Papers // May 2009

    Enhancing Telecommunication Business Process Representation and Integration with Ontologised Industry Standards

    This paper shows how semantic technologies can be used in combination with industry standards to pursue the goal of business domain driven Business Process Management. The authors show how semantic technologies used in modelling core work flow elements of Business Process Models can be used to bootstrap the operationalisation of...

    Provided By Open University

  • White Papers // Apr 2007

    Towards an Ontology for Process Monitoring and Mining

    Business Process Analysis (BPA) aims at monitoring, diagnosing, simulating and mining enacted processes in order to support the analysis and enhancement of process models. An effective BPA solution must provide the means for analyzing existing e-businesses at three levels of abstraction: the Business Level, the Process Level and the IT...

    Provided By Open University

  • White Papers // Feb 2009

    Strategy-driven Business Process Analysis

    Business Process Analysis (BPA) aims to verify, validate, and identify potential improvements for business processes. Despite the wide range of technologies developed so far, the large amount of information that needs to be integrated and processed, as well as the quantity of data that has to be produced and presented...

    Provided By Open University