Politecnico di Torino

Displaying 1-40 of 93 results

  • White Papers // Dec 2013

    Efficient Protocols for Secure Broadcast in Controller Area Networks

    Controller Area Network (CAN) is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past controllers were assumed to operate in secure perimeters, but today these environments are well connected to the outside world and recent incidents showed them extremely vulnerable to cyber-attacks....

    Provided By Politecnico di Torino

  • White Papers // Oct 2013

    Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels

    Defining security objectives for industrial control scenarios is a challenging task due to the subtle interactions between system components and because security goals are often far from obvious. Moreover, there is a persistent gap between formal models for channels and adversaries (usually, transition systems) and models for control systems (differential...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks

    Despite realistic concerns, security inside vehicular buses (such as CAN) is still absent mostly due to technical challenges: low bandwidth and processing power, low cost margins, etc. Here, the authors design an efficient protocol based entirely on simple symmetric primitives that takes advantage of two interesting procedures which they call...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    A Layer-Based, Matric Oriented Business Process Simulation Solution

    In this paper, the authors review and compare different business process modeling techniques, reveal their capabilities and use a combination of their elements to create a model of applicable simulation solution that is easy to understand on the one hand but enables integration of innovative complex dynamics on the other...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    Knowledge Intensive Processes as a Challenge for Business Process Simulation

    This paper presents literature review and theoretical background for simulation of knowledge intensive processes. In the beginning it describes the concept of knowledge economy - environment, in which most modern organizations have to operate. In the next step it tries to define what knowledge intensity means as well as what...

    Provided By Politecnico di Torino

  • White Papers // May 2013

    Features and Functions of a Business Process Modeler

    Business Process Modeling (BPM) is defined as the activity of representing processes of an enterprise, so that the current process may be analyzed and improved. Modeling is further connected with activities of simulation, evaluation, and optimization. BPM is typically performed by business analysts who are seeking to improve process efficiency...

    Provided By Politecnico di Torino

  • White Papers // Feb 2013

    Cryptographic Puzzles and DoS Resilience, Revisited

    Cryptographic puzzles (or client puzzles) are moderately difficult problems that can be solved by investing non-trivial amounts of computation and/or storage. Devising models for cryptographic puzzles has only recently started to receive attention from the cryptographic community as a first step toward rigorous models and proofs of security of applications...

    Provided By Politecnico di Torino

  • White Papers // Oct 2012

    Benefits of Using Enterprise Resource Planning Systems

    During the last years several enterprises have used significant amounts of money for their resource planning systems. In ideal situations these investments have proven to help enterprises to have more efficient business processes. They have also enabled significant cost savings and better information sharing. However, many enterprises have also got...

    Provided By Politecnico di Torino

  • White Papers // Sep 2012

    Business Process Management in Practice of Czech Companies

    The purpose of this paper is to provide an overview of applications of principles of Business Process Management in department of energetics in company Barum Continental, Ltd. which ensures the energy operation of manufacturing and office building of this company. The paper aims to point out the potential of increasing...

    Provided By Politecnico di Torino

  • White Papers // Jul 2012

    Secure Broadcast with One-Time Signatures in Controller Area Networks

    Broadcast authentication in Controller Area Networks (CAN) is subject to real time constraints that are hard to satisfy by expensive public key primitives. For this purpose, the authors study here the use of one-time signatures which can be built on the most computationally efficient one-way functions. They use an enhancement...

    Provided By Politecnico di Torino

  • White Papers // Jul 2012

    Revisiting Difficulty Notions for Client Puzzles and DoS Resilience

    Cryptographic puzzles are moderately difficult problems that can be solved by investing non-trivial amounts of computation and/or storage. Devising models for cryptographic puzzles has only recently started to receive attention from the cryptographic community as a first step towards rigorous models and proofs of security of applications that employ them...

    Provided By Politecnico di Torino

  • White Papers // Apr 2012

    Offloading Cellular Networks Through ITS Content Download

    Content downloading by mobile users is expected to significantly increase the cellular network load. Vehicular users, in particular, are likely to engage in information retrieval on the move: in this context, Intelligent Transportation Systems (ITS) can play an important role in offloading the cellular infrastructure. The authors investigate the effectiveness...

    Provided By Politecnico di Torino

  • White Papers // Feb 2012

    Broadcast Authentication in a Low Speed Controller Area Network

    Controller Area Network (CAN) is a communication bus that has no cryptographic protection against malicious adversaries. Once isolated, the environments in which CAN operates are now opened to intruders and assuring broadcast authentication becomes a concern. To achieve this, public key primitives are not a solution because of the computational...

    Provided By Politecnico di Torino

  • White Papers // Dec 2011

    Knowledge Applications Solutions at the SME Level in the E-Enterprise Business Intelligence

    The paper presents the knowledge management and business, intelligent concepts in order to analyze enterprise internal and external resources based on the knowledge transfer and capitalization processes. The virtual enterprise business network purposed solution expect to improve Small and Medium-sized Enterprises (SMEs) involvement in new product manufacturing networking efforts in...

    Provided By Politecnico di Torino

  • White Papers // Oct 2011

    Protocol Vulnerabilities in Practice: Causes, Modeling and Automatic Detection

    Starting from practical scenarios the authors underline that the most relevant security vulnerabilities in practice come from weak protocol design or implementation flaws rather than from weak or flawed cryptography. In particular, they outline security vulnerabilities in several kinds of scenarios starting from well explored fields such as computer networks...

    Provided By Politecnico di Torino

  • White Papers // Sep 2011

    Exploiting Traffic Dynamics in Power-Aware Logical Topology Design

    The authors propose the Multi-Period Power-Aware Logical Topology Design. They compared two different heuristics and show that exploiting the day-night fluctuations of the traffic can lead to significant power savings at a low reconfiguration cost. Recent studies show that the Information and Communication Technologies (ICT) sector is responsible for a...

    Provided By Politecnico di Torino

  • White Papers // Jul 2011

    Proactive Seeding for Information Cascades in Cellular Networks

    In today's Internet, Online Social Networks (OSNs) play an important role in informing users about content. At the same time, mobile devices provide ubiquitous access to this content through the cellular infrastructure. In this paper, the authors propose Proactive Seeding - a technique for minimizing the peak load of cellular...

    Provided By Politecnico di Torino

  • White Papers // Jul 2011

    Bounds on QoS-Constrained Energy Savings in Cellular Access Networks With Sleep Modes

    Sleep modes are emerging as a promising technique for energy-efficient networking: by adequately putting to sleep and waking up network resources according to traffic demands, proportionality between energy consumption and network utilization can be approached, with important reductions in energy consumption. Previous studies have investigated and evaluated sleep modes for...

    Provided By Politecnico di Torino

  • White Papers // Jul 2011

    Switch-Off Transients in Cellular Access Networks With Sleep Modes

    The introduction of sleep modes in the operations of base stations is today considered one of the most promising approaches to reduce the energy consumption of cellular access networks. Several papers have considered this option, assuming that the switch-on and switch-off transients are of negligible duration. In this paper, the...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Passive Characterization of SopCast Usage in Residential ISPs

    In this paper, the authors present an extensive analysis of traffic generated by SopCast users and collected from operative networks of three national ISPs in Europe. After more than a year of continuous monitoring, they present results about the popularity of SopCast which is the largely preferred application in the...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Customizing Protocol Specifications for Detecting Resource Exhaustion and Guessing Attacks

    Model checkers for security protocols often focus on basic properties, such as confidentiality or authentication, using a standard model of the Dolev-Yao intruder. In this paper, the authors explore how to model other attacks, notably guessing of secrets and denial of service by resource exhaustion, using the AVANTSSAR platform with...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Some Security Issues in SCALANCE Wireless Industrial Networks

    The authors discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network control systems. After the identification of the Stuxnet worm, which targeted PLCs from uranium enrichment facilities in Iran, these devices become of increased interest...

    Provided By Politecnico di Torino

  • White Papers // May 2011

    Investigating Overlay Topologies and Dynamics of P2P-TV Systems: the Case of SopCast

    Several successful commercial P2P-TV applications are already available. Unfortunately, some algorithms and protocols they adopt are unknown, since many follow a closed and proprietary design. This calls for tools and methodologies that allow the investigation of the application behavior. In this paper, the authors present a novel approach to analyze...

    Provided By Politecnico di Torino

  • White Papers // May 2011

    Design and Control of Next Generation Distribution Frames

    Today, the permutation of circuits in the Main Distribution Frames (MDF), which connect the subscriber lines to POTS and to DSLAMs, is still operated manually. However, new market regulations, allowing subscribers to change network operator frequently, and the new schemes to concentrate active ADSL users into few DSLAMs during off-peak...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Management of Business Processes Through Reengineering

    Re-engineering is considered to be a means of transforming the organization into a flexible, knowledge-based and structured to serve clients needs system and allows and allow fundamental rethinking and radical redesign of business processes to achieve dramatic improvements in business indicators considered critical in evaluating performance - cost, quality, service...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Application of System Dynamics Model and GIS in Sustainability Assessment of Urban Residential Development

    Considering rapid population growth and urbanization, sustainability assessment of residential development has become increasingly necessary for understanding environmental impacts and supporting urban planning. In this paper, due to the urban activities cause impacts not only on local level but also a broader scale, a simulation model, using System Dynamics (SD)...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Business Networks in the Internationalization of B-to-B-Services

    This paper focuses on business networks in the internationalization of b-to-b-services. The literature includes vast amount of knowledge of internationalization of a firm in general. A great deal of this literature is based on the concept of incremental stepwise internationalization process and empirical findings in manufacturing companies. So far, little...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Experiences of Internet Traffic Monitoring With Tstat

    Since the early days of the Internet, network traffic monitoring has always played a strategic role in understanding and characterize users' activities. In this paper, the authors present their experience in engineering and deploying Tstat, an open source passive monitoring tool that has been developed in the past ten years....

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Creating Portable and Efficient Packet Processing Applications

    Network processors are special-purpose programmable units deployed in many modern high-speed network devices, which combine flexibility and high performance. However, software development for these platforms is traditionally cumbersome due both to the lack of adequate programming abstractions and to the impossibility of reusing the same software on different hardware platforms....

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Concealable, Low-Cost Paper-Printed Antennas for WISP-Based RFIDs

    Paper-based, inkjet-printed antennas are proposed in this paper as replacement for the typical antennas used on the WISP RFID tag. These antennas are designed to be as concealable as possible. The designs presented exploit meandered techniques in order to achieve significantly reduced dimensions. In particularly, text-based meandered line techniques are...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Requirements Elicitation Using BPM Notations: Focusing on the Strategic Level Representation

    Business Process Models (BPM) can be useful for requirements elicitation, among other uses. Since the active participation of all stakeholders is a key factor for successful requirements engineering, it is important that BPM be shared by all stakeholders. Unfortunately, organizations may end up with inconsistent BPM not covering all stakeholders'...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    A Wireless Sensor Network-Based Approach to Large-Scale Dimensional Metrology

    In many branches of industry, dimensional measurements have become an important part of the production cycle, in order to check product compliance with specifications. This task is not trivial especially when dealing with large-scale dimensional measurements: the bigger the measurement dimensions are, the harder is to achieve high accuracies. Nowadays,...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Business Model for Mobility and Interactivity in Heterogeneous Convergent Environment - A Study Case

    This paper presents a study for a business model applied to heterogeneous systems for a mobility and interactivity framework. The main idea is a system based in heterogeneity and convergence technological oriented to end-user. Now-a-days, the conventional systems are formed only by homogeneous systems and not always end-to-end. For this...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Linked Data Approach for Selection Process Automation in Systematic Reviews

    A systematic review is a literature review performed to answer a set of research questions and has to be performed according to a pre-defined protocol describing how primary sources are selected and categorized. It strives to produce an objective evaluation of findings available on a certain topic, reducing as much...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Mining Unclassified Traffic Using Automatic Clustering Techniques

    In this paper, the authors present a fully unsupervised algorithm to identify classes of traffic inside an aggregate. The algorithm leverages on the K-means clustering algorithm, augmented with a mechanism to automatically determine the number of traffic clusters. The signatures used for clustering are statistical representations of the application layer...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Modeling Sleep Modes Gains With Random Graphs

    Nowadays two main approaches are being pursued to reduce energy consumption of network devices: the use of sleep modes in which devices can be put in low-power state, and the adoption of energy proportional approaches where the device architecture is designed to make energy consumption proportional to the actual load....

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    10-year Experience of Internet Traffic Monitoring With Tstat

    Network monitoring has always played a key role in understanding telecommunication networks since the pioneering time of the Internet. Today, monitoring traffic has become a key element to characterize network usage and users' activities, to understand how complex applications work, to identify anomalous or malicious behaviors. In this paper, the...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Design of Fault-Tolerant Logical Topologies in Wavelength-Routed Optical IP Networks

    In this paper the authors illustrate a new methodology for the design of fault-tolerant logical topologies in wavelength-routed optical networks exploiting wavelength division multiplexing, and supporting both unicast and multicast IP datagram flows. The approach to protection and restoration generalizes the "Design protection" concepts, and relies on the dynamic capabilities...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Efficient Broadcasting of Safety Messages in Multihop Vehicular Networks

    Broadcasting of safety messages is one of the fundamental services in multihop vehicular networks. These services typically require to deliver the information to all vehicles traveling over a geographical area, with high reliability and low delay. The authors focus on a unidirectional vehicular network supporting safety applications, and they present...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Vehicular Mobility Simulation for VANETs

    During the last few years, continuous progresses in wireless communications have opened new research fields in computer networking, aimed at extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a growing attention from both academia and industry, due to the amount and...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Design of Fault-Tolerant Logical Topologies in Wavelength-Routed Optical IP Networks

    In this paper the authors illustrate a new methodology for the design of fault-tolerant logical topologies in wavelength-routed optical networks exploiting wavelength division multiplexing, and supporting both unicast and multicast IP datagram flows. The approach to protection and restoration generalizes the "Design protection" concepts, and relies on the dynamic capabilities...

    Provided By Politecnico di Torino

  • White Papers // Sep 2009

    A Lightweight Distributed Solution to Content Replication in Mobile Networks

    Performance and reliability of content access in mobile networks is conditioned by the number and location of content replicas deployed at the network nodes. Facility location theory has been the traditional, centralized approach to study content replication: computing the number and placement of replicas in a network can be cast...

    Provided By Politecnico di Torino

  • White Papers // Jun 2009

    Improving the Reusability and Interoperability of E-Learning Material

    A key requirement for e-learning materials is reusability and interoperability, that is the possibility to use at least part of the contents in different courses, and to deliver them trough different platforms. These features make possible to limit the cost of new packages, but require the development of material according...

    Provided By Politecnico di Torino

  • White Papers // Jul 2009

    A Review of Localization Algorithms for Distributed Wireless Sensor Networks in Manufacturing

    Wireless Sensor Networks (WSNs) typically consist of a large number of densely populated sensor nodes. Due to important advances in integrated circuits and radio technologies, the use of distributed sensor networks is becoming increasingly widespread for a variety of applications, e.g. indoor navigation, environmental monitoring, people and object tracking, logistics,...

    Provided By Politecnico di Torino

  • White Papers // May 2010

    An Empirical Regressive Model to Improve the Metrological Performance of Mobile Spatial Coordinate Measuring Systems

    The Mobile Spatial coordinate Measuring system (MScMS) is a system to perform dimensional measurements of large-scale objects. It consists of a wireless measuring probe with UltraSonic (US) transceivers, the position of which is determined using a distributed constellation of analogous transceivers arranged around the measuring area. The principle is to...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    A Wireless Sensor Network-Based Approach to Large-Scale Dimensional Metrology

    In many branches of industry, dimensional measurements have become an important part of the production cycle, in order to check product compliance with specifications. This task is not trivial especially when dealing with large-scale dimensional measurements: the bigger the measurement dimensions are, the harder is to achieve high accuracies. Nowadays,...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Efficient Broadcasting of Safety Messages in Multihop Vehicular Networks

    Broadcasting of safety messages is one of the fundamental services in multihop vehicular networks. These services typically require to deliver the information to all vehicles traveling over a geographical area, with high reliability and low delay. The authors focus on a unidirectional vehicular network supporting safety applications, and they present...

    Provided By Politecnico di Torino

  • White Papers // Jan 2010

    Service Providers Indexing Using P2P Systems

    The idea of sharing resources across the network has become very popular during the last few years, leading to a diversified scenario in which shared resources include not only files and videos but also storage and CPU cycles. A new trend is to extend this paradigm toward a distributed architecture...

    Provided By Politecnico di Torino

  • White Papers // Aug 2010

    Optimizing Deep Packet Inspection for High-Speed Traffic Analysis

    Deep Packet Inspection (DPI) techniques are considered extremely expensive in terms of processing costs and therefore are usually deployed in edge networks, where the amount of data to be processed is limited. This paper demonstrates that, in case the application can tolerate some compromises in terms of accuracy (such as...

    Provided By Politecnico di Torino

  • White Papers // Jun 2010

    SPAF: Stateless FSA-Based Packet Filters

    The authors propose a stateless packet filtering technique based on Finite-State Automata (FSA). FSAs provide a comprehensive framework with well-defined composition operations that enable the generation of stateless filters from high-level specifications and their compilation into efficient executable code without resorting to various opportunistic optimization algorithms. In contrast with most...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Creating Portable and Efficient Packet Processing Applications

    Network processors are special-purpose programmable units deployed in many modern high-speed network devices, which combine flexibility and high performance. However, software development for these platforms is traditionally cumbersome due both to the lack of adequate programming abstractions and to the impossibility of reusing the same software on different hardware platforms....

    Provided By Politecnico di Torino

  • White Papers // Nov 2010

    Reliable SPARQL Queries With Consistent Results Over P2P-Shared RDF Storage

    One aim of the semantic web is to build large knowledge bases distributed over the internet. Knowledge management systems that gather, merge and make available the information physically stored in multiple locations suffer from consistency and data fragmentation issues due to node failures. In this paper the authors address such...

    Provided By Politecnico di Torino

  • White Papers // Nov 2009

    Remote Ethernet PLC Networking and Control

    Now-a-days, in the people highly automated, high-tech society, programmable logic controllers PLC are as common as their personal computers or laptops. They are more resilient and more compact than conventional computers, they can be programmed to be very specific tasks and they can be used in all kind of environments....

    Provided By Politecnico di Torino

  • White Papers // Aug 2009

    Dimensioning Rules Regarding Radio Resources in GSM/GPRS Networks

    Many paper have studied traffic modeling in GSM/GPRS networks trying to establish different performance parameters needed for dimensioning purposes. An important element of these networks is the radio resources. Sharing resources between different users and different services is a key concept of radio resources dimensioning in GSM/GPRS networks. In this...

    Provided By Politecnico di Torino

  • White Papers // Aug 2009

    Traffic Models and Associated Parameters in GSM/(E)GPRS Networks

    GSM/ (E)GPRS networks support a mixture of traffic consisting of voice and data. A key concept of dimensioning radio resources in such networks is represented by sharing resources between different users and different services. In this paper, the authors address the problem of voice and data traffic models according to...

    Provided By Politecnico di Torino

  • White Papers // Feb 2010

    Hy-Sim: Model Based Hybrid Simulation Framework for WSN Application Development

    By bringing the physical world and the virtual one closer, one is able to expand the possibilities of accelerating and easing embedded system design. In case of Wireless Sensor Network (WSNs), which require testing of the developed applications in hundreds to thousands of nodes, this is even more useful. The...

    Provided By Politecnico di Torino

  • White Papers // Jun 2009

    Engineering a Quality of Service-Enabled Network: A Case Study

    This paper presents a case study concerning a network operator that wants to provide services with a certain degree of quality to its customers. Users are presented with a set of services with different Quality of Service capabilities and the network is engineered in order to satisfy the requests and...

    Provided By Politecnico di Torino

  • White Papers // Jan 2010

    NETPDL: An Extensible XML-Based Language for Packetheader Description

    Although several applications need to know the format of network packets to perform their tasks, till now, each application uses its own packet description database. This paper addresses this problem by proposing the NetPDL, an XML-based language for describing packet headers, which has the potential of enabling the realization of...

    Provided By Politecnico di Torino

  • White Papers // Apr 2008

    Cryptographic Authentication on the Communication From an 8051 Based Development Board Over UDP

    Implementing cryptography on devices with low computational power is a necessity as they became involved in communications over public networks. Even more, these devices became ubiquitous and are used in a large area of applications, from home-office systems to industrial control systems. The authors deal with the design and implementation...

    Provided By Politecnico di Torino

  • White Papers // Jul 2011

    Proactive Seeding for Information Cascades in Cellular Networks

    In today's Internet, Online Social Networks (OSNs) play an important role in informing users about content. At the same time, mobile devices provide ubiquitous access to this content through the cellular infrastructure. In this paper, the authors propose Proactive Seeding - a technique for minimizing the peak load of cellular...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Concealable, Low-Cost Paper-Printed Antennas for WISP-Based RFIDs

    Paper-based, inkjet-printed antennas are proposed in this paper as replacement for the typical antennas used on the WISP RFID tag. These antennas are designed to be as concealable as possible. The designs presented exploit meandered techniques in order to achieve significantly reduced dimensions. In particularly, text-based meandered line techniques are...

    Provided By Politecnico di Torino

  • White Papers // Apr 2012

    Offloading Cellular Networks Through ITS Content Download

    Content downloading by mobile users is expected to significantly increase the cellular network load. Vehicular users, in particular, are likely to engage in information retrieval on the move: in this context, Intelligent Transportation Systems (ITS) can play an important role in offloading the cellular infrastructure. The authors investigate the effectiveness...

    Provided By Politecnico di Torino

  • White Papers // Jun 2009

    On the Performance of Secure Vehicular Communication Systems

    Vehicular Communication (VC) systems are being developed primarily to enhance transportation safety and efficiency. Vehicle-to-vehicle communication, in particular frequent cooperative awareness messages or safety beacons, have been considered over the past years as a main approach. Meanwhile, the need to provide security and safeguard the users privacy is well understood,...

    Provided By Politecnico di Torino

  • White Papers // Sep 2011

    Exploiting Traffic Dynamics in Power-Aware Logical Topology Design

    The authors propose the Multi-Period Power-Aware Logical Topology Design. They compared two different heuristics and show that exploiting the day-night fluctuations of the traffic can lead to significant power savings at a low reconfiguration cost. Recent studies show that the Information and Communication Technologies (ICT) sector is responsible for a...

    Provided By Politecnico di Torino

  • White Papers // Dec 2011

    Knowledge Applications Solutions at the SME Level in the E-Enterprise Business Intelligence

    The paper presents the knowledge management and business, intelligent concepts in order to analyze enterprise internal and external resources based on the knowledge transfer and capitalization processes. The virtual enterprise business network purposed solution expect to improve Small and Medium-sized Enterprises (SMEs) involvement in new product manufacturing networking efforts in...

    Provided By Politecnico di Torino

  • White Papers // May 2010

    Mapping a Fuzzy Logic Approach for QoS-Aware Service Selection on Current Web Service Standards

    The authors propose FQ (Fuzzy-QoS), a complete architecture for including user preferences and Quality of Service characteristics in the selection process of web services. Besides the flexibility of the selection and ranking algorithm, the authors consider of equal importance the properties of the implementation: compliance with standards, backwards compatibility and...

    Provided By Politecnico di Torino

  • White Papers // May 2013

    Features and Functions of a Business Process Modeler

    Business Process Modeling (BPM) is defined as the activity of representing processes of an enterprise, so that the current process may be analyzed and improved. Modeling is further connected with activities of simulation, evaluation, and optimization. BPM is typically performed by business analysts who are seeking to improve process efficiency...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    A Layer-Based, Matric Oriented Business Process Simulation Solution

    In this paper, the authors review and compare different business process modeling techniques, reveal their capabilities and use a combination of their elements to create a model of applicable simulation solution that is easy to understand on the one hand but enables integration of innovative complex dynamics on the other...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    Knowledge Intensive Processes as a Challenge for Business Process Simulation

    This paper presents literature review and theoretical background for simulation of knowledge intensive processes. In the beginning it describes the concept of knowledge economy - environment, in which most modern organizations have to operate. In the next step it tries to define what knowledge intensity means as well as what...

    Provided By Politecnico di Torino

  • White Papers // Sep 2012

    Business Process Management in Practice of Czech Companies

    The purpose of this paper is to provide an overview of applications of principles of Business Process Management in department of energetics in company Barum Continental, Ltd. which ensures the energy operation of manufacturing and office building of this company. The paper aims to point out the potential of increasing...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Requirements Elicitation Using BPM Notations: Focusing on the Strategic Level Representation

    Business Process Models (BPM) can be useful for requirements elicitation, among other uses. Since the active participation of all stakeholders is a key factor for successful requirements engineering, it is important that BPM be shared by all stakeholders. Unfortunately, organizations may end up with inconsistent BPM not covering all stakeholders'...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Management of Business Processes Through Reengineering

    Re-engineering is considered to be a means of transforming the organization into a flexible, knowledge-based and structured to serve clients needs system and allows and allow fundamental rethinking and radical redesign of business processes to achieve dramatic improvements in business indicators considered critical in evaluating performance - cost, quality, service...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Business Model for Mobility and Interactivity in Heterogeneous Convergent Environment - A Study Case

    This paper presents a study for a business model applied to heterogeneous systems for a mobility and interactivity framework. The main idea is a system based in heterogeneity and convergence technological oriented to end-user. Now-a-days, the conventional systems are formed only by homogeneous systems and not always end-to-end. For this...

    Provided By Politecnico di Torino

  • White Papers // Oct 2012

    Benefits of Using Enterprise Resource Planning Systems

    During the last years several enterprises have used significant amounts of money for their resource planning systems. In ideal situations these investments have proven to help enterprises to have more efficient business processes. They have also enabled significant cost savings and better information sharing. However, many enterprises have also got...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Business Networks in the Internationalization of B-to-B-Services

    This paper focuses on business networks in the internationalization of b-to-b-services. The literature includes vast amount of knowledge of internationalization of a firm in general. A great deal of this literature is based on the concept of incremental stepwise internationalization process and empirical findings in manufacturing companies. So far, little...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Some Security Issues in SCALANCE Wireless Industrial Networks

    The authors discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network control systems. After the identification of the Stuxnet worm, which targeted PLCs from uranium enrichment facilities in Iran, these devices become of increased interest...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks

    Despite realistic concerns, security inside vehicular buses (such as CAN) is still absent mostly due to technical challenges: low bandwidth and processing power, low cost margins, etc. Here, the authors design an efficient protocol based entirely on simple symmetric primitives that takes advantage of two interesting procedures which they call...

    Provided By Politecnico di Torino

  • White Papers // Dec 2013

    Efficient Protocols for Secure Broadcast in Controller Area Networks

    Controller Area Network (CAN) is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past controllers were assumed to operate in secure perimeters, but today these environments are well connected to the outside world and recent incidents showed them extremely vulnerable to cyber-attacks....

    Provided By Politecnico di Torino

  • White Papers // Feb 2013

    Cryptographic Puzzles and DoS Resilience, Revisited

    Cryptographic puzzles (or client puzzles) are moderately difficult problems that can be solved by investing non-trivial amounts of computation and/or storage. Devising models for cryptographic puzzles has only recently started to receive attention from the cryptographic community as a first step toward rigorous models and proofs of security of applications...

    Provided By Politecnico di Torino

  • White Papers // Oct 2013

    Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels

    Defining security objectives for industrial control scenarios is a challenging task due to the subtle interactions between system components and because security goals are often far from obvious. Moreover, there is a persistent gap between formal models for channels and adversaries (usually, transition systems) and models for control systems (differential...

    Provided By Politecnico di Torino