Reed Business Information

Displaying 1-40 of 341 results

  • White Papers // May 2014

    Adaptive Preshuffling in Hadoop Clusters

    MapReduce has become an important distributed processing model for large-scale data-intensive applications like data mining and web indexing. Hadoop - an open-source implementation of MapReduce is widely used for short jobs requiring low response time. In this paper, the authors proposed a new preshuffling strategy in Hadoop to reduce high...

    Provided By Reed Business Information

  • White Papers // Apr 2014

    Optimal Sequential Wireless Relay Placement on a Random Lattice Path

    The authors' paper is motivated by impromptu (or \"As-you-go\") deployment of wireless relay nodes along a path, a need that arises in many situations. In this paper, the path is modeled as starting at the origin (where there is the data sink, e.g., the control center), and evolving randomly over...

    Provided By Reed Business Information

  • White Papers // Feb 2014

    Terahertz Band: Next Frontier for Wireless Communications

    In this paper, the authors provide an in-depth view of Terahertz band (0.1 - 10THz) communication, which is envisioned as a key technology to satisfy the increasing demand for higher speed wireless communication. THz band communication will alleviate the spectrum scarcity and capacity limitations of current wireless systems, and enable...

    Provided By Reed Business Information

  • White Papers // Jan 2014

    A Survey of Intrusion Detection in Wireless Network Applications

    Information systems are becoming more integrated into the people lives. As this integration deepens, the importance of securing these systems increases. Because of lower installation and maintenance costs, many of these systems are largely networked by wireless means. In order to identify gaps and propose research directions in wireless network...

    Provided By Reed Business Information

  • White Papers // Jan 2014

    EnhancedBit: Unleashing the Potential of the Unchoking Policy in the BitTorrent Protocol

    In this paper, the authors propose a modification to the BitTorrent protocol related to its peer unchoking policy. In particular, they apply a novel optimistic unchoking approach that improves the quality of inter-connections amongst peers, i.e., increases the number of directly-connected and interested-in-cooperation peers without penalizing underutilized and/or idle peers....

    Provided By Reed Business Information

  • White Papers // Dec 2013

    Resilience Articulation Point (RAP): Cross-Layer Dependability Modeling for Nanometer System-on-Chip Resilience

    The Resilience Articulation Point (RAP) model aims at provisioning researchers and developers with a probabilistic fault abstraction and error propagation framework covering all hardware/software layers of a System-on-Chip (SoC). RAP assumes that physically induced faults at the technology or CMOS device layer will eventually manifest themselves as a single or...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    Unified Reliability Estimation and Management of NoC Based Chip Multiprocessors

    The authors present a new architecture level unified reliability evaluation methodology for Chip Multi-Processors (CMPs). The proposed Reliability ESTimation (REST) is based on a Monte Carlo algorithm. What distinguishes REST from the previous work is that both the computational and communication components are considered in a unified manner to compute...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    LTE-Advanced and the Evolution to Beyond 4G (B4G) Systems

    Cellular networks have been undergoing an extraordinarily fast evolution in the past years. With commercial deployments of Release 8 (Rel-8) Long Term Evolution (LTE) already being carried out worldwide, a significant effort is being put forth by the research and standardization communities on the development and specification of LTE-advanced. The...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    Tibidabo: Making the Case for an ARM-Based HPC System

    It is widely accepted that future HPC systems will be limited by their power consumption. Current HPC systems are built from commodity server processors, designed over years to achieve maximum performance, with energy efficiency being an after-thought. In this paper, the authors advocate a different approach: building HPC systems from...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    Design Configuration Selection for Hard-Error Reliable Processors Via Statistical Rules

    Lifetime reliability is becoming a first-order concern in processor manufacturing in addition to conventional design goals including performance, power consumption and thermal features since semiconductor technology enters the deep submicron era. This paper requires computer architects to carefully examine each design option and evaluate its reliability, in order to prolong...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    A Two-Phase Design Space Exploration Strategy for System-Level Real-Time Application Mapping Onto MPSoC

    In this paper, the authors present a two-phase Design Space Exploration (DSE) approach to address the problem of real-time application mapping on a flexible MPSoC platform. Their approach is composed of two independent phases - analytical estimation/pruning and system simulation - communicating via a well-defined interface. The strength of the...

    Provided By Reed Business Information

  • White Papers // Oct 2013

    Demand-Based Schedulability Analysis for Real-Time Multi-Core Scheduling

    In real-time systems, schedulability analysis has been widely studied to provide offline guarantees on temporal correctness, producing many analysis methods. The demand-based schedulability analysis method has a great potential for high schedulability performance and broad applicability. However, such a potential is not yet fully realized for real-time multi-core scheduling mainly...

    Provided By Reed Business Information

  • White Papers // Oct 2013

    Computational Cost Analysis on Securing RFID Protocols Conforming to EPC Class-1 Generation-2 Standard

    A Radio Frequency IDentification (RFID) system is a contactless automatic identification system that uses small and low-cost tags. RFID systems communicate with the tags attached to the objects using radio frequency waves. The major problem with RFID systems is security problem because the communication between RFID components is wireless. In...

    Provided By Reed Business Information

  • White Papers // Oct 2013

    The COMPLEX Methodology for UML/MARTE Modeling and Design Space Exploration of Embedded Systems

    The design of embedded systems is in a highly competitive context. The translation of an efficient design into a successful product highly depends on becoming the first product in the market with new complex functionalities fulfilling tight performance constraints, and at an affordable price. In this paper, the task of...

    Provided By Reed Business Information

  • White Papers // Sep 2013

    Onion Routing Circuit Construction Via Latency Graphs

    The use of anonymity-based infrastructures and anonymisers is a plausible solution to mitigate privacy problems on the Internet. Tor (short for the onion router) is a popular low-latency anonymity system that can be installed as an end-user application on a wide range of operating systems to redirect the traffic through...

    Provided By Reed Business Information

  • White Papers // Sep 2013

    DeSyRe: On-Demand System Reliability

    The DeSyRe project builds on-demand adaptive and reliable Systems-on-Chips (SoCs). As fabrication technology scales down, chips are becoming less reliable, thereby incurring increased power and performance costs for fault tolerance. To make matters worse, power density is becoming a significant limiting factor in SoC design, in general. In the face...

    Provided By Reed Business Information

  • White Papers // Sep 2013

    Multi-Objective Scheduling of Many Tasks in Cloud Platforms

    The scheduling of a many-task workflow in a distributed computing platform is a well known NP-hard problem. The problem is even more complex and challenging when the virtualized clusters are used to execute a large number of tasks in a cloud computing platform. The difficulty lies in satisfying multiple objectives...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    A Survey on Vehicular Cloud Computing

    Vehicular networking has become a significant research area due to its specific features and applications such as standardization, efficient traffic management, road safety and infotainment. Vehicles are expected to carry relatively more communication systems, on board computing facilities, storage and increased sensing power. Hence, several technologies have been deployed to...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    SE-AKA: A Secure and Efficient Group Authentication and Key Agreement Protocol for LTE Networks

    To support Evolved Packet System (EPS) in the Long Term Evolution (LTE) networks, the 3rd Generation Partnership Project (3GPP) has proposed an Authentication and Key Agreement (AKA) protocol, named EPS-AKA, which has become an emerging standard for Fourth-Generation (4G) wireless communications. However, due to the requirement of backward compatibility, EPS-AKA...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    Online Scheduling and Placement of Hardware Tasks With Multiple Variants on Dynamically Reconfigurable Field-Programmable Gate Arrays

    Hardware task scheduling and placement at runtime plays a crucial role in achieving better system performance by exploring dynamically reconfigurable Field-Programmable Gate Arrays (FPGAs). Although a number of online algorithms have been proposed in the literature, no strategy has been engaged in efficient usage of reconfigurable resources by orchestrating multiple...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    A System-Level Approach to Adaptivity and Fault-Tolerance in NoC-Based MPSoCs: The MADNESS Project

    Modern embedded systems increasingly require adaptive run-time management of available resources. One method for supporting adaptively is to implement run-time application mapping. The system may adapt the mapping of the applications in order to accommodate the current workload conditions, to balance the computing load for efficient resource utilization, to meet...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Analysis of the Impact of Spatial and Temporal Variations on the Stability of SRAM Arrays and the Mitigation Technique Using Independent-Gate Devices

    As planar MOSFET is approaching its physical scaling limits, FinFET becomes one of the most promising alternative structures to keep on the industry scaling-down trend for future technology generations of 22nm and beyond. In this paper, the authors investigate the influence of NBTI degradation induced variation and random process variations...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    A Unified Execution Model for Multiple Computation Models of Streaming Applications on a Composable MPSoC

    In this paper, the authors propose a unified model of execution that aims to fill the abstraction level gap between the primitives of models of computation and the ones of an MPSoC. This paper targets a composable MPSoC platform and supports the sequential, Kahn process networks, and dataflow models. Their...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Compiling Scilab to High Performance Embedded Multicore Systems

    Efficient, flexible, and high performance chips are needed. Many performance-critical applications (e.g. digital video processing, telecoms, and security applications) that need to process huge amounts of data in a short time would benefit from these attributes. The mapping process of high performance embedded applications to today's Multi-Processor System-on-Chip (MPSoC) devices...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Efficient Multi-Keyword Ranked Query Over Encrypted Data in Cloud Computing

    Cloud computing infrastructure is a promising new technology and greatly accelerates the development of large scale data storage, processing and distribution. However, security and privacy become major concerns when data owners outsource their private data onto public cloud servers that are not within their trusted management domains. To avoid information...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    An Integrated, Programming Model-Driven Framework for NoC-QoS Support in Cluster-Based Embedded Many-Cores

    Embedded SoC designs are embracing the many-core paradigm to deliver the required performance to run an ever-increasing number of applications in parallel. Networks-on-Chip (NoC) are considered as a convenient technology to implement many-core embedded platforms. The complex and non-uniform nature of the traffic flows generated when multiple parallel applications are...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Privacy-Preserving Smart Metering with Multiple Data Consumers

    The increasing diffusion of Automatic Meter Reading (AMR) and the possibility to open the system to third party services has raised many concerns about the protection of personal data related to energy, water or gas consumption, from which details about the habits of the users can be inferred. This paper...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    OpenMOLE, a Workflow Engine Specifically Tailored for the Distributed Exploration of Simulation Models

    Complex-systems describe multiple levels of collective structure and organization. In such systems, the emergence of global behavior from local interactions is generally studied through large scale experiments on numerical models. This analysis generates important computation loads which require the use of multi-core servers, clusters or grid computing. Dealing with such...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Thermal Aware Overall Energy Minimization Scheduling for Hardreal-Time Systems

    As the semiconductor technology proceeds into the deep sub-micron era, the leakage and its dependency with the temperature become critical in dealing with power/energy minimization problems. In this paper, the authors study the problem on how to schedule a hard real-time system to achieve the minimal overall energy, including both...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Efficient Multicast Schemes for 3-D Networks-on-Chip

    3-D Network-on-Chips (NoCs) have been proposed as a potent solution to address both the interconnection and design complexity problems facing future System-on-Chip (SoC) designs. In this paper, two topology-aware multicast routing algorithms, Multicasting XYZ (MXYZ) and ALternative XYZ (AL + XYZ) algorithms in supporting of 3-D NoC are proposed. In...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Controlling a Complete Hardware Synthesis Toolchain With LARA Aspects

    The synthesis and mapping of applications to configurable embedded systems is a notoriously complex process. Design-flows typically include tools that have a wide range of parameters which interact in very unpredictable ways, thus creating a large and complex design space. When exploring this space, designers must manage the interfaces between...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Exploiting Domain Knowledge in System-Level MPSoC Design Space Exploration

    System-level Design Space Exploration (DSE), which is performed early in the design process, is of eminent importance to the design of complex multi-processor embedded multimedia systems. During system-level DSE, system parameters like, e.g., the number and type of processors, and the mapping of application tasks to architectural resources, are considered....

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Limited Carry-In Technique for Real-Time Multi-Core Scheduling

    Schedulability analysis has been widely studied to provide offline timing guarantees for a set of real-time tasks. The so-called limited carry-in technique, which can be orthogonally incorporated into many different multi-core schedulability analysis methods, was originally introduced for Earliest Deadline First (EDF) scheduling to derive a tighter bound on the...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Energy-Aware Simulation with DVFS

    In recent years, research has been conducted in the area of large systems models, especially distributed systems, to analyze and understand their behavior. Simulators are now commonly used in this area and are becoming more complex. Most of them provide frameworks for simulating application scheduling in various grid infrastructures, others...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Avoiding Request - Request Type Message-Dependent Deadlocks in Networks-on-Chips

    When an application is running on a Network-on-Chip (NoC)-based Multi-Processor System-on-Chip (MPSoC), two types of deadlocks may occur: the routing-dependent deadlocks and the message-dependent deadlocks. The former type of deadlocks can be avoided by removing any cyclic paths on the application's channel dependency graph. The message dependent deadlocks, caused by...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    A Novel Batch-Based Group Key Management Protocol Applied to the Internet of Things

    Many applications for ad hoc networks are based on a point-to-multipoint (multicast) communication paradigm, where a single source sends common data to many receivers, or, inversely, on a multipoint-to-point communication paradigm, where multiple sources send data to a single receiver. In such scenarios, communication can be secured by adopting a...

    Provided By Reed Business Information

  • White Papers // May 2013

    ARTE: An Application-Specific Run-Time ManagEment Framework for Multi-Cores Based on Queuing Models

    In this paper, the authors present an Application-specific Run-Time managEment (ARTE) framework to tackle the problem of managing computational resources in an application specific multi-core system. The ARTE framework run-time goal is to minimize applications' response times while meeting the applications' computational demands and fitting within the available power budget....

    Provided By Reed Business Information

  • White Papers // May 2013

    Two-Level Caches Tuning Technique for Energy Consumption in Reconfigurable Embedded MPSoC

    In order to meet the ever-increasing computing requirement in the embedded market, multiprocessor chips were proposed as the best way out. In this paper, the authors investigate the energy consumption in these embedded MPSoC systems. One of the efficient solutions to reduce the energy consumption is to reconfigure the cache...

    Provided By Reed Business Information

  • White Papers // May 2013

    Optimizing Two-Dimensional DMA Transfers for Scratchpad Based MPSoCs Platforms

    Reducing the effects of off-chip memory access latency is a key factor in exploiting efficiently embedded multi-core platforms. The authors consider architectures that admit a multi-core computation fabric, having its own fast and small memory to which the data blocks to be processed are fetched from external memory using a...

    Provided By Reed Business Information

  • White Papers // May 2013

    DocCloud: A Document Recommender System on Cloud Computing With Plausible Deniability

    Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. Little work has been done regarding secure recommender systems or how to cope with the legal...

    Provided By Reed Business Information

  • White Papers // Dec 2012

    Building a Reliable and High-Performance Content-Based Publish/subscribe System

    Provisioning reliability in a high-performance content-based publish/subscribe system is a challenging problem. The inherent complexity of content-based routing makes message loss detection and recovery, and network state recovery extremely complicated. Existing proposals either try to reduce the complexity of handling failures in a traditional network architecture, which only partially address...

    Provided By Reed Business Information

  • White Papers // Dec 2011

    Dynamic Circuit Provisioning in All-Optical WDM Networks Using Lightpath Switching

    In this paper, the authors investigate the problem of provisioning Holding-Time-Aware (HTA) dynamic circuits in all-optical Wavelength Division Multiplexed (WDM) networks. They employ a technique called Light-Path Switching (LPS) wherein the data transmission may begin on one light-path and switch to a different light-path at a later time. Light-path switches...

    Provided By Reed Business Information

  • White Papers // Apr 2009

    Rappel: Exploiting Interest and Network Locality to Improve Fairness in Publish-Subscribe Systems

    In this paper, the authors present the design, implementation and evaluation of Rappel, a peer-to-peer feed-based publish-subscribe service. By using a combination of probabilistic and gossip-like techniques and mechanisms, Rappel provides noiselessness, i.e., updates from any feed are received and relayed only by nodes that are subscribers of that feed....

    Provided By Reed Business Information

  • White Papers // Sep 2011

    GPS Signal Acquisition via Compressive Multichannel Sampling

    In this paper, the authors propose an efficient acquisition scheme for GPS receivers. It is shown that GPS signals can be effectively sampled and detected using a bank of randomized correlators with much fewer chip-matched filters than those used in existing GPS signal acquisition algorithms. The latter use correlations with...

    Provided By Reed Business Information

  • White Papers // May 2009

    Small-Buffer Networks

    Today, because of TCP dynamics, Internet backbone routers hold large packet buffers, which significantly increase their power consumption and design time. Recent models of large-buffer networks have suggested that these large buffers could be replaced with much smaller ones. Unfortunately, it turns out that these large-buffer network models are not...

    Provided By Reed Business Information

  • White Papers // Jul 2012

    Characterizing Spot Price Dynamics in Public Cloud Environments

    The surge in demand for utilizing public Cloud resources has introduced many trade-offs between price, performance and recently reliability. Amazon's Spot Instances (SIs) create a competitive bidding option for public Cloud users at lower prices without providing reliability on services. It is generally believed that SIs reduce monetary cost to...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    An Effective 3-in-1 Keyword Search Method Over Heterogeneous Data Sources

    Conventional keyword search engines are restricted to a given data model and cannot easily adapt to unstructured, semi-structured or structured data. In this paper, the authors propose an efficient and adaptive keyword search method, called EASE, for indexing and querying large collections of heterogeneous data. To achieve high efficiency in...

    Provided By Reed Business Information

  • White Papers // Oct 2012

    A Two Phased Service Oriented Broker for Replica Selection in Data Grids

    Replica selection is one of the fundamental problems in Data Grid's environment. This paper's concern is designing a Two phased Service Oriented Broker (2SOB) for replica selection. It is focused on investigating, selecting, modifying, and experimenting with some non-conventional approaches to be applied on the relevant selection techniques. The motivation...

    Provided By Reed Business Information

  • White Papers // Sep 2012

    An Efficient Critical Protection Scheme for Intra-Domain Routing Using Link Characteristics

    In recent years, there are substantial demands to reduce packet loss on the Internet. Among the proposed schemes, finding backup paths in advance is considered to be an effective method to reduce the reaction time. Very commonly, a backup path is chosen to be the most disjoint path from the...

    Provided By Reed Business Information

  • White Papers // May 2012

    Optimal Transmission Schemes for Parallel and Fading Gaussian Broadcast Channels With an Energy Harvesting Rechargeable Transmitter

    The authors consider an energy harvesting transmitter sending messages to two users over parallel and fading Gaussian broadcast channels. Energy required for communication arrives (is harvested) at the transmitter and a finite-capacity battery stores it before being consumed for transmission. Under off-line knowledge of energy arrival and channel fading variations,...

    Provided By Reed Business Information

  • White Papers // May 2013

    DocCloud: A Document Recommender System on Cloud Computing With Plausible Deniability

    Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. Little work has been done regarding secure recommender systems or how to cope with the legal...

    Provided By Reed Business Information

  • White Papers // Aug 2011

    Skew-Space Garbage Collection

    Semispace garbage collectors relocate all the live objects in one step, which is simple and leads to good performance. Compared with mark-compact collectors, however, they need to reserve extra heap space for copying live objects. As much as half of the heap could be reserved as it is possible that...

    Provided By Reed Business Information

  • White Papers // Jun 2010

    Accelerating the Reduction to Upper Hessenberg, Tridiagonal, and Bidiagonal Forms Through Hybrid GPU-Based Computing

    The authors present a Hessenberg Reduction (HR) algorithm for hybrid systems of homogeneous multicore with GPU accelerators that can exceed 25 the performance of the corresponding LAPACK algorithm running on current homogeneous multicores. This enormous acceleration is due to proper matching of algorithmic requirements to architectural strengths of the system's...

    Provided By Reed Business Information

  • White Papers // Apr 2012

    An Integrated System Based on Wireless Sensor Networks for Patient Monitoring, Localization and Tracking

    This paper describes the system LAURA which provides patient localization, tracking and monitoring services within nursing institutes through a wireless sensor network. The system is composed of three functional blocks: a localization and tracking engine which performs localization out of samples of the received signal strength and tracking through a...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    Upper and Lower Bounds on Subcarrier Collision for Inter-Cell Interference Scheduler in OFDMA-Based Systems: Voice Traffic

    This paper investigates upper and lower bounds on subcarrier collision for Inter-Cell Interference (ICI) schedulers in Orthogonal Frequency Division Multiple Access (OFDMA)- based wireless systems carrying voice traffic. It is shown that the amount of knowledge regarding the reserved resources in the neighboring cell plays a crucial role in the...

    Provided By Reed Business Information

  • White Papers // Apr 2011

    Statistical Wireless Channel Propagation Characteristics in Underground Mines at 900 MHz: A Comparative Analysis With Indoor Channels

    This work investigates the wideband characterization of radio propagation channel for an active, real underground mine environment. Important statistical parameters related to path loss, delay, and amplitude characteristics are extracted. Impact of different antenna heights on path loss exponent is investigated. The same measurement procedure is performed to extract the...

    Provided By Reed Business Information

  • White Papers // Jul 2012

    Mobile Cloud Computing: A Survey

    Despite increasing usage of mobile computing, exploiting its full potential is difficult due to its inherent problems such as resource scarcity, frequent disconnections, and mobility. Mobile cloud computing can address these problems by executing mobile applications on resource providers external to the mobile device. In this paper, the authors provide...

    Provided By Reed Business Information

  • White Papers // Oct 2011

    Supporting Ubiquitous Sensor-Cloudlets and Context-Cloudlets: Programming Compositions of Context-Aware Systems for Mobile Users

    Increasing widespread use of sensor and networking technologies are yielding ubiquitous sensors and applications that pervade daily life. At the same time, context-aware pervasive computing has experienced tremendous developments in terms of context modelling and reasoning, and applications. Such developments coupled with a cloud computing model are yielding sensor-cloudlets and...

    Provided By Reed Business Information

  • White Papers // May 2010

    RADIO-MAMA: An RFID Based Business Process Framework for Asset Management

    This paper discusses a framework (called RADIO-MAMA) using a FRID technology for real-time management of mobile assets. The authors decompose an asset management system into atomic or composite Business Processes (BPs). Triggered by RFID events, the business events are invoked automatically. Data gathering from RFID receivers are used to fill...

    Provided By Reed Business Information

  • White Papers // Jan 2013

    SIPAD: SIP - VoIP Anomaly Detection Using a Stateful Rule Tree

    Voice over IP (VoIP) services has become prevalent lately because of their potential advantages such as economic efficiency and useful features. Meanwhile, Session Initiation Protocol (SIP) is being widely used as a session protocol for the VoIP services. Many mobile VoIP applications have recently been launched, and they are becoming...

    Provided By Reed Business Information

  • White Papers // Jul 2011

    Identifying Botnets by Capturing Group Activities in DNS Traffic

    Botnets have become the main vehicle to conduct online crimes such as DDoS, spam, phishing and identity theft. Even though numerous efforts have been directed towards detection of botnets, evolving evasion techniques easily thwart detection. Moreover, existing approaches can be overwhelmed by the large amount of data needed to be...

    Provided By Reed Business Information

  • White Papers // Aug 2012

    QuARES: A Quality-Aware Renewable Energy-Driven Sensing Framework

    Renewable energy technologies have become a promising solution to reduce energy concerns that arise due to limited battery in wireless sensor networks. While this enables one to prolong the lifetime of a sensor network (perpetually), the realization of sustainable sensor platforms is challenging due to the unstable nature of environmental...

    Provided By Reed Business Information

  • White Papers // Jan 2012

    A Secure Cookie Scheme

    Cookies are the primary means for web applications to authenticate HTTP requests and to maintain client states. Many web applications (such as those for electronic commerce) demand a secure cookie scheme. Such a scheme needs to provide the following four services: authentication, confidentiality, integrity, and anti-replay. Several secure cookie schemes...

    Provided By Reed Business Information

  • White Papers // Mar 2009

    PAP: A Privacy and Authentication Protocol for Passive RFID Tags

    Passive Radio Frequency IDentification (RFID) tags, due to their ability to uniquely identify every individual item and low cost, are well suited for supply chain management and are expected to replace barcodes in the near future. However, unlike barcodes, these tags have a longer range in which they are allowed...

    Provided By Reed Business Information

  • White Papers // Jul 2011

    The Aneka Platform and QoS-Driven Resource Provisioning for Elastic Applications on Hybrid Clouds

    Cloud computing alters the way traditional software systems are built and run by introducing a utility-based model for delivering IT infrastructure, platforms, applications, and services. The consolidation of this new paradigm in both enterprises and academia demanded reconsideration in the way IT resources are used, so Cloud computing can be...

    Provided By Reed Business Information

  • White Papers // Dec 2011

    SLA-Based Admission Control for a Software-as-a-Service Provider in Cloud Computing Environments

    Software-as-a-Service (SaaS) provides access to applications to end users over the Internet without upfront investment in infrastructure and software. To serve their customers, SaaS providers utilise resources of internal data centres or rent resources from a public Infrastructure-as-a-Service (IaaS) provider. In-house hosting can increase administration and maintenance costs whereas renting...

    Provided By Reed Business Information

  • White Papers // Jul 2012

    Failure-Aware Resource Provisioning for Hybrid Cloud Infrastructure

    Hybrid Cloud computing is receiving increasing attention in recent days. In order to realize the full potential of the hybrid Cloud platform, an architectural framework for efficiently coupling public and private Clouds is necessary. As resource failures due to the increasing functionality and complexity of hybrid Cloud computing are inevitable,...

    Provided By Reed Business Information

  • White Papers // May 2010

    Environment-Conscious Scheduling of HPC Applications on Distributed Cloud-Oriented Data Centers

    The use of High Performance Computing (HPC) in commercial and consumer IT applications is becoming popular. HPC users need the ability to gain rapid and scalable access to high-end computing capabilities. Cloud computing promises to deliver such a computing infrastructure using data centers so that HPC users can access applications...

    Provided By Reed Business Information

  • White Papers // May 2011

    Use of Run Time Predictions for Automatic Co-Allocation of Multi-Cluster Resources for Iterative Parallel Applications

    Metaschedulers co-allocate resources by requesting a fixed number of processors and usage time for each cluster. These static requests, defined by users, limit the initial scheduling and prevent rescheduling of applications to other resource sets. It is also difficult for users to estimate application execution times, especially on heterogeneous environments....

    Provided By Reed Business Information

  • White Papers // Sep 2011

    An Integrated Sparsity and Model-Based Probabilistic Framework for Estimating the Spatial Variations of Communication Channels

    In the past few years, the sensor network revolution has created the possibility of exploring and controlling the environment in ways not possible before. The vision of a multi-agent robotic network cooperatively learning and adapting in harsh unknown environments to achieve a common goal is closer than ever. A mobile...

    Provided By Reed Business Information

  • White Papers // Feb 2011

    Delay-Sensitive and Multimedia Communication in Cognitive Radio Sensor Networks

    Multimedia and delay-sensitive data applications in Cognitive Radio Sensor Networks (CRSN) require efficient real-time communication and Dynamic Spectrum Access (DSA) capabilities. This requirement poses emerging problems to be addressed in inherently resource-constrained sensor networks, and needs investigation of CRSN challenges with real-time communication requirements. In this paper, the main design...

    Provided By Reed Business Information

  • White Papers // Oct 2011

    Analysis of the Information Storage Capability of VANET for Highway and City Traffic

    Vehicles in VANET can form wireless ad hoc mesh networks (VMeshes) that are mobile, constantly changing both in size and the geographic area they cover. The authors focus on how the VMeshes can be used to capture and retain certain transient information on the road within a given region of...

    Provided By Reed Business Information

  • White Papers // Dec 2012

    Hybrid FRR/p-Cycle Design for Link and Node Protection in MPLS Networks

    Survivable MPLS technologies are crucial in ensuring reliable communication services. The Fast Re-Route (FRR) mechanism has been standardized to achieve fast local repair of Label Switched Paths (LSPs) in the event of link or node failures. The authors present a suite of hybrid protection schemes for MPLS networks that combine...

    Provided By Reed Business Information

  • White Papers // Feb 2011

    On Coverage Issues in Directional Sensor Networks: A Survey

    The coverage optimization problem has been examined thoroughly for omni-directional sensor networks in the past decades. However, the coverage problem in Directional Sensor Networks (DSN) has newly taken attraction, especially with the increasing number of Wireless Multimedia Sensor Network (WMSN) applications. Directional sensor nodes equipped with ultrasound, infrared, and video...

    Provided By Reed Business Information

  • White Papers // Oct 2012

    Energy Monitoring in Residential Spaces With Audio Sensor Nodes: TinyEARS

    Awareness on how and where energy is consumed is being increasingly recognized as the key to prevent waste in next-generation smart buildings. However, while several solutions exist to monitor energy consumption patterns for commercial and industrial users, energy reporting systems currently available to residential users require time-consuming and intrusive installation...

    Provided By Reed Business Information

  • White Papers // Apr 2012

    Rerouting in Advance Reservation Networks

    The advance reservation of network connections is an area of growing interest and a range of service models and algorithms have been proposed to achieve various scheduling objectives, i.e., including optimization-based strategies and heuristic schemes. Now given the time-shifted nature of future requests, rerouting strategies have also been considered to...

    Provided By Reed Business Information

  • White Papers // May 2012

    An Energy-Centric Handover Decision Algorithm for the Integrated LTE Macrocell - Femtocell Network

    Femtocells are attracting a fast increasing interest now-a-days, as a promising solution to improve indoor coverage and system capacity. Due to the short transmit-receive distance, femtocells can greatly lower transmit power, prolong handset battery life, and enhance the user-perceived Quality of Service (QoS). On the other hand, technical challenges still...

    Provided By Reed Business Information

  • White Papers // Dec 2011

    On the Need for a Reputation System in Mobile Phone Based Sensing

    The continual advancement in semiconductor technology has enabled vendors to integrate an increasing number of sensors, e.g., accelerometer, gyroscope, digital compass, high resolution cameras and others, in modern mobile phones. Combining with the ever expanding market penetration of mobile phones, the onboard sensors are driving the sensing community towards a...

    Provided By Reed Business Information

  • White Papers // Dec 2010

    Dynamic Demultiplexing in Network Calculus - Theory and Application

    During the last two decades, starting with the seminal work by Cruz, network calculus has evolved as a new theory for the performance analysis of networked systems. In contrast to classical queuing theory, it deals with performance bounds instead of average values and thus has been the theoretical basis of...

    Provided By Reed Business Information

  • White Papers // Mar 2012

    Almost Optimal Distributed M2M Multicasting in Wireless Mesh Networks

    Wireless Mesh Networking (WMN) is an emerging communication paradigm to enable resilient, cost-efficient and reliable services for the future-generation wireless networks. In this paper, the authors study the problem of Multipoint-To-Multipoint (M2M) multicasting in a WMN which aims to use the minimum number of time slots to exchange messages among...

    Provided By Reed Business Information