Reed Business Information

Displaying 1-40 of 253 results

  • White Papers // Jan 2014

    A Survey of Intrusion Detection in Wireless Network Applications

    Information systems are becoming more integrated into the people lives. As this integration deepens, the importance of securing these systems increases. Because of lower installation and maintenance costs, many of these systems are largely networked by wireless means. In order to identify gaps and propose research directions in wireless network...

    Provided By Reed Business Information

  • White Papers // Oct 2013

    Computational Cost Analysis on Securing RFID Protocols Conforming to EPC Class-1 Generation-2 Standard

    A Radio Frequency IDentification (RFID) system is a contactless automatic identification system that uses small and low-cost tags. RFID systems communicate with the tags attached to the objects using radio frequency waves. The major problem with RFID systems is security problem because the communication between RFID components is wireless. In...

    Provided By Reed Business Information

  • White Papers // Oct 2013

    The COMPLEX Methodology for UML/MARTE Modeling and Design Space Exploration of Embedded Systems

    The design of embedded systems is in a highly competitive context. The translation of an efficient design into a successful product highly depends on becoming the first product in the market with new complex functionalities fulfilling tight performance constraints, and at an affordable price. In this paper, the task of...

    Provided By Reed Business Information

  • White Papers // Sep 2013

    Onion Routing Circuit Construction Via Latency Graphs

    The use of anonymity-based infrastructures and anonymisers is a plausible solution to mitigate privacy problems on the Internet. Tor (short for the onion router) is a popular low-latency anonymity system that can be installed as an end-user application on a wide range of operating systems to redirect the traffic through...

    Provided By Reed Business Information

  • White Papers // Sep 2013

    DeSyRe: On-Demand System Reliability

    The DeSyRe project builds on-demand adaptive and reliable Systems-on-Chips (SoCs). As fabrication technology scales down, chips are becoming less reliable, thereby incurring increased power and performance costs for fault tolerance. To make matters worse, power density is becoming a significant limiting factor in SoC design, in general. In the face...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    A Survey on Vehicular Cloud Computing

    Vehicular networking has become a significant research area due to its specific features and applications such as standardization, efficient traffic management, road safety and infotainment. Vehicles are expected to carry relatively more communication systems, on board computing facilities, storage and increased sensing power. Hence, several technologies have been deployed to...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    SE-AKA: A Secure and Efficient Group Authentication and Key Agreement Protocol for LTE Networks

    To support Evolved Packet System (EPS) in the Long Term Evolution (LTE) networks, the 3rd Generation Partnership Project (3GPP) has proposed an Authentication and Key Agreement (AKA) protocol, named EPS-AKA, which has become an emerging standard for Fourth-Generation (4G) wireless communications. However, due to the requirement of backward compatibility, EPS-AKA...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Efficient Multi-Keyword Ranked Query Over Encrypted Data in Cloud Computing

    Cloud computing infrastructure is a promising new technology and greatly accelerates the development of large scale data storage, processing and distribution. However, security and privacy become major concerns when data owners outsource their private data onto public cloud servers that are not within their trusted management domains. To avoid information...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    An Integrated, Programming Model-Driven Framework for NoC-QoS Support in Cluster-Based Embedded Many-Cores

    Embedded SoC designs are embracing the many-core paradigm to deliver the required performance to run an ever-increasing number of applications in parallel. Networks-on-Chip (NoC) are considered as a convenient technology to implement many-core embedded platforms. The complex and non-uniform nature of the traffic flows generated when multiple parallel applications are...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    OpenMOLE, a Workflow Engine Specifically Tailored for the Distributed Exploration of Simulation Models

    Complex-systems describe multiple levels of collective structure and organization. In such systems, the emergence of global behavior from local interactions is generally studied through large scale experiments on numerical models. This analysis generates important computation loads which require the use of multi-core servers, clusters or grid computing. Dealing with such...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Energy-Aware Simulation with DVFS

    In recent years, research has been conducted in the area of large systems models, especially distributed systems, to analyze and understand their behavior. Simulators are now commonly used in this area and are becoming more complex. Most of them provide frameworks for simulating application scheduling in various grid infrastructures, others...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    A Novel Batch-Based Group Key Management Protocol Applied to the Internet of Things

    Many applications for ad hoc networks are based on a point-to-multipoint (multicast) communication paradigm, where a single source sends common data to many receivers, or, inversely, on a multipoint-to-point communication paradigm, where multiple sources send data to a single receiver. In such scenarios, communication can be secured by adopting a...

    Provided By Reed Business Information

  • White Papers // May 2013

    ARTE: An Application-Specific Run-Time ManagEment Framework for Multi-Cores Based on Queuing Models

    In this paper, the authors present an Application-specific Run-Time managEment (ARTE) framework to tackle the problem of managing computational resources in an application specific multi-core system. The ARTE framework run-time goal is to minimize applications' response times while meeting the applications' computational demands and fitting within the available power budget....

    Provided By Reed Business Information

  • White Papers // May 2013

    Optimizing Two-Dimensional DMA Transfers for Scratchpad Based MPSoCs Platforms

    Reducing the effects of off-chip memory access latency is a key factor in exploiting efficiently embedded multi-core platforms. The authors consider architectures that admit a multi-core computation fabric, having its own fast and small memory to which the data blocks to be processed are fetched from external memory using a...

    Provided By Reed Business Information

  • White Papers // May 2013

    Cloud Monitoring: A Survey

    Now-a-days, cloud computing is widely used to deliver services over the Internet for both technical and economical reasons. The number of cloud-based services has increased rapidly and strongly in the last years, and so is increased the complexity of the infrastructures behind these services. To properly operate and manage such...

    Provided By Reed Business Information

  • White Papers // May 2013

    DocCloud: A Document Recommender System on Cloud Computing With Plausible Deniability

    Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. Little work has been done regarding secure recommender systems or how to cope with the legal...

    Provided By Reed Business Information

  • White Papers // Apr 2013

    An Approximate Approach for Area Coverage in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), coverage is a critical issue that has a major bearing on the quality of sensing over the target region. In this paper, the authors study the coverage of a region P with a transparent boundary and transparent obstacles. A transparent obstacle is an area in...

    Provided By Reed Business Information

  • White Papers // Mar 2013

    Model-Driven Provisioning of Application Services in Hybrid Computing Environments

    Hybrid computing environment is making rapid progress in acceptance by SMEs, government agencies, universities and scientists. Such computing environment cannot only reduce management costs, but is pivotal to enabling next generation of applications on unprecedented scales. Research and development efforts in hybrid computing environments are still at infancy. More tangible...

    Provided By Reed Business Information

  • White Papers // Mar 2013

    A Memory-Based NFA Regular Expression Match Engine for Signature-Based Intrusion Detection

    Signature-based intrusion detection is required to inspect network traffic at wire-speed. Matching packet payloads against patterns specified with regular expression is a computation intensive task. Hence, the design of hardware accelerator to speed up regular expression matching has been an active research area. A systematic approach to detect regular expression...

    Provided By Reed Business Information

  • White Papers // Mar 2013

    Conceptual Framework for Non-Hierarchical Business Networks for Complex Products Design and Manufacturing

    The effective creation and management of business networks is more and more an important contribution for the competitiveness and sustainability of European SMEs. In Non-hierarchical networks SMEs join their competencies and resources to grab profitable business opportunities. In these networks SMEs take the leading role and control the business instead...

    Provided By Reed Business Information

  • White Papers // Feb 2013

    From Conceptual Process Models to Running Systems: A Holistic Approach for the Configuration of Enterprise System Processes

    This paper proposes a method which aims at increasing the efficiency of Enterprise System implementations. First, the authors argue that existing process modeling languages that feature different degrees of abstraction for different user groups exist and are used for different purposes which makes it necessary to integrate them. The authors...

    Provided By Reed Business Information

  • White Papers // Jan 2013

    Hierarchical QR Factorization Algorithms for Multi-Core Clusters

    In this paper, the authors describe a new QR factorization algorithm which is especially designed for massively parallel platforms combining parallel distributed nodes, where a node is a multi-core processor. These platforms represent the present and the foreseeable future of high-performance computing. Their new QR factorization algorithm falls in the...

    Provided By Reed Business Information

  • White Papers // Jan 2013

    Core Groups: System Abstractions for Extending the Dynamic Range of Client Devices Using Heterogeneous Cores

    Mobile devices have emerged as a dominant computing platform for end users, resulting in an unprecedented increase in the range of performance demands imposed on them by their many rich applications, and at the same time, battery life and energy efficiency remain critical concerns. Yet modern processors are typically designed...

    Provided By Reed Business Information

  • White Papers // Jan 2013

    SIPAD: SIP - VoIP Anomaly Detection Using a Stateful Rule Tree

    Voice over IP (VoIP) services has become prevalent lately because of their potential advantages such as economic efficiency and useful features. Meanwhile, Session Initiation Protocol (SIP) is being widely used as a session protocol for the VoIP services. Many mobile VoIP applications have recently been launched, and they are becoming...

    Provided By Reed Business Information

  • White Papers // Dec 2012

    Building a Reliable and High-Performance Content-Based Publish/subscribe System

    Provisioning reliability in a high-performance content-based publish/subscribe system is a challenging problem. The inherent complexity of content-based routing makes message loss detection and recovery, and network state recovery extremely complicated. Existing proposals either try to reduce the complexity of handling failures in a traditional network architecture, which only partially address...

    Provided By Reed Business Information

  • White Papers // Dec 2012

    An Investigation on the Unwillingness of Nodes to Participate in Mobile Delay Tolerant Network Routing

    Message routing in mobile delay tolerant networks inherently relies on the cooperation between nodes. In most existing routing protocols, the participation of nodes in the routing process is taken as granted. However, in reality, nodes can be unwilling to participate. In this paper, the impact of the unwillingness of nodes...

    Provided By Reed Business Information

  • White Papers // Dec 2012

    Hybrid FRR/p-Cycle Design for Link and Node Protection in MPLS Networks

    Survivable MPLS technologies are crucial in ensuring reliable communication services. The Fast Re-Route (FRR) mechanism has been standardized to achieve fast local repair of Label Switched Paths (LSPs) in the event of link or node failures. The authors present a suite of hybrid protection schemes for MPLS networks that combine...

    Provided By Reed Business Information

  • White Papers // Nov 2012

    Securing the Smart Grid Marketplace: General Trends and Overnight Scheduling Electric Vehicle Demand

    The authors give an overview of data security issues for the smart electrical grid. In the recent past, the electrical power system has experienced unexpected, large-scale, cascading failures initiated by relatively small failures (which may be deliberately caused in the future), and market manipulation (a well-known example of which is...

    Provided By Reed Business Information

  • White Papers // Oct 2012

    A Two Phased Service Oriented Broker for Replica Selection in Data Grids

    Replica selection is one of the fundamental problems in Data Grid's environment. This paper's concern is designing a Two phased Service Oriented Broker (2SOB) for replica selection. It is focused on investigating, selecting, modifying, and experimenting with some non-conventional approaches to be applied on the relevant selection techniques. The motivation...

    Provided By Reed Business Information

  • White Papers // Oct 2012

    Security of Interdependent and Identical Networked Control Systems

    In this paper, the authors study security decisions of identical plant-controller systems, when their security is interdependent due to network induced risks. Each plant is modeled by a discrete-time stochastic linear system, with the systems controlled over a shared communication network. They formulate the problem of security choices of the...

    Provided By Reed Business Information

  • White Papers // Oct 2012

    Energy Monitoring in Residential Spaces With Audio Sensor Nodes: TinyEARS

    Awareness on how and where energy is consumed is being increasingly recognized as the key to prevent waste in next-generation smart buildings. However, while several solutions exist to monitor energy consumption patterns for commercial and industrial users, energy reporting systems currently available to residential users require time-consuming and intrusive installation...

    Provided By Reed Business Information

  • White Papers // Sep 2012

    Knowledge Management in the Age of Cloud Computing and Web 2.0: Experiencing the Power of Disruptive Innovations

    Organizations, of all types, live in an increasingly dynamic world. Much of this dynamism is generated by developments or innovations in technology, especially Information and Communication Technology (ICT). Some organizations take advantage of this dynamism and create new products and business models and thrive. Others ignore it or take a...

    Provided By Reed Business Information

  • White Papers // Sep 2012

    VMPlanner: Optimizing Virtual Machine Placement and Traffic Flow Routing to Reduce Network Power Costs in Cloud Data Centers

    In recent years, the power costs of cloud data centers have become a practical concern and have attracted significant attention from both industry and academia. Most of the early works on data center energy efficiency have focused on the biggest power consumers (i.e., computer servers and cooling systems), yet without...

    Provided By Reed Business Information

  • White Papers // Sep 2012

    An Efficient Critical Protection Scheme for Intra-Domain Routing Using Link Characteristics

    In recent years, there are substantial demands to reduce packet loss on the Internet. Among the proposed schemes, finding backup paths in advance is considered to be an effective method to reduce the reaction time. Very commonly, a backup path is chosen to be the most disjoint path from the...

    Provided By Reed Business Information

  • White Papers // Aug 2012

    Governing Bot-as-a-Service in Sustainability Platforms - Issues and Approaches

    The emerging cloud computing models for Internet-of-Things have fostered the development of lightweight applications using cloud services for monitoring and optimizing devices and equipment hosted in distributed facilities. Such applications - called bots in the authors' work - can be composed and deployed with multiple types of governance policies from...

    Provided By Reed Business Information

  • White Papers // Aug 2012

    QuARES: A Quality-Aware Renewable Energy-Driven Sensing Framework

    Renewable energy technologies have become a promising solution to reduce energy concerns that arise due to limited battery in wireless sensor networks. While this enables one to prolong the lifetime of a sensor network (perpetually), the realization of sustainable sensor platforms is challenging due to the unstable nature of environmental...

    Provided By Reed Business Information

  • White Papers // Jul 2012

    A Formal Study on Topology and Floorplan Characteristics of Mesh and Torus-Based Optical Networks-on-Chip

    The efficiency of collaboration among processors is a critical design metric for Multi-Processor System-on-Chips (MPSoCs). It is the communication architecture that determines the collaboration efficiency on the hardware side. Optical NoCs, which are based on optical interconnects and optical routers, offer a new approach to empowering ultra-high bandwidth with low...

    Provided By Reed Business Information

  • White Papers // Jul 2012

    An Authentication Flaw in Browser-based Single Sign-On Protocols: Impact and Remediations

    Browser-based Single Sign-On (SSO) protocols relieve the user from the burden of dealing with multiple credentials thereby improving the user experience and the security. In this paper, the authors show that extreme care is required for specifying and implementing the prototypical browser-based SSO use case. They show that the main...

    Provided By Reed Business Information

  • White Papers // Jul 2012

    Characterizing Spot Price Dynamics in Public Cloud Environments

    The surge in demand for utilizing public Cloud resources has introduced many trade-offs between price, performance and recently reliability. Amazon's Spot Instances (SIs) create a competitive bidding option for public Cloud users at lower prices without providing reliability on services. It is generally believed that SIs reduce monetary cost to...

    Provided By Reed Business Information

  • White Papers // Jul 2012

    Access Control for Online Social Networks Third Party Applications

    With the development of web 2.0 technologies, online social networks are able to provide open platforms to enable the seamless sharing of profile data to enable public developers to interface and extend the social network services as applications. At the same time, these open interfaces pose serious privacy concerns as...

    Provided By Reed Business Information

  • White Papers // Feb 2011

    A Comprehensive Study of Energy Efficiency and Performance of Flash-Based SSD

    Use of flash memory as a storage medium is becoming popular in diverse computing environments. However, because of differences in interface, flash memory requires a hard-disk-emulation layer, called FTL (Flash Translation Layer). Although the FTL enables flash memory storages to replace conventional hard disks, it induces significant computational and space...

    Provided By Reed Business Information

  • White Papers // Aug 2009

    Symmetric Active/active Metadata Service for High Availability Parallel File Systems

    High availability data storage systems are critical for many applications as research and business become more data driven. Since metadata management is essential to system availability, multiple metadata services are used to improve the availability of distributed storage systems. Past research has focused on the active/standby model, where each active...

    Provided By Reed Business Information

  • White Papers // Apr 2011

    Resource Allocation Robustness in Multi-Core Embedded Systems With Inaccurate Information

    Multi-core technologies are widely used in embedded systems and the resource allocation is vita to guarantee Quality of Service (QoS) requirements for applications on multi-core platforms. For heterogeneous multi-core systems, the statistical characteristics of execution times on different cores play a critical role in the resource allocation, and the differences...

    Provided By Reed Business Information

  • White Papers // Jul 2008

    An Efficient Design for Fast Memory Registration in RDMA

    Remote Direct Memory Access(RDMA)improves network bandwidth and reduces latency by eliminating unnecessary copies from network interface card to application buffers, but the communication buffer management to reduce memory registration and deregistration cost is a significant challenge to be addressed. Previous studies use pin-down cache and batched deregistration, but only simple...

    Provided By Reed Business Information

  • White Papers // Feb 2008

    CRBAC: Imposing Multi-Grained Constraints on the RBAC Model in the Multi-Application Environment

    Interactions between resources as well as services are one of the fundamental characteristics in the distributed multi-application environments. In such environments, Attribute-Based Access Control (ABAC) mechanisms are gaining in popularity while the Role-Based Access Control (RBAC) mechanism is widely accepted as a general mechanism for authorization management. This paper proposes...

    Provided By Reed Business Information

  • White Papers // Aug 2010

    On an Efficient NoC Multicasting Scheme in Support of Multiple Applications Running on Irregular Sub-Networks

    When a number of applications simultaneously running on a many-core Chip Multi-Processor (CMP) chip connected through Network-on-Chip (NoC), significant amount of on-chip traffic is one-to-many (multicast) in nature. As a matter of fact, when multiple applications are mapped onto an NoC architecture with applicable traffic isolation constraints, the corresponding sub-networks...

    Provided By Reed Business Information

  • White Papers // Mar 2009

    Architectures and Routing Schemes for Optical Network-on-Chips

    As indicated in the latest version of ITRS roadmap, optical wiring is a viable interconnects technology for future SoC/SiC/SiP designs that can provide broad band data transfer rates unmatchable by the existing metal/low-k dielectric interconnects. In this paper, the authors present an interconnection architecture, referred as the Wavelength Routed Optical...

    Provided By Reed Business Information

  • White Papers // Jul 2012

    A Formal Study on Topology and Floorplan Characteristics of Mesh and Torus-Based Optical Networks-on-Chip

    The efficiency of collaboration among processors is a critical design metric for Multi-Processor System-on-Chips (MPSoCs). It is the communication architecture that determines the collaboration efficiency on the hardware side. Optical NoCs, which are based on optical interconnects and optical routers, offer a new approach to empowering ultra-high bandwidth with low...

    Provided By Reed Business Information

  • White Papers // Jun 2006

    Mutating Database Queries

    A set of mutation operators for SQL queries that retrieve information from a database is developed and tested against a set of queries drawn from the NIST SQL conformance test suite. The mutation operators cover a wide spectrum of SQL features, including the handling of null values. Additional experiments are...

    Provided By Reed Business Information

  • White Papers // Jan 2013

    Core Groups: System Abstractions for Extending the Dynamic Range of Client Devices Using Heterogeneous Cores

    Mobile devices have emerged as a dominant computing platform for end users, resulting in an unprecedented increase in the range of performance demands imposed on them by their many rich applications, and at the same time, battery life and energy efficiency remain critical concerns. Yet modern processors are typically designed...

    Provided By Reed Business Information

  • White Papers // Apr 2012

    Interference Mitigation for Cognitive Radio MIMO Systems Based on Practical Precoding

    In this paper, the authors propose two subspace-projection-based precoding schemes, namely, Full-Projection (FP)- and Partial-Projection (PP)-based precoding, for a Cognitive Radio Multiple-Input Multiple-Output (CR-MIMO) network to mitigate its interference to a primary Time-Division-Duplexing (TDD) system. The proposed precoding schemes are capable of estimating interference channels between CR and primary networks,...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    Data Obfuscation With Network Coding

    Network coding techniques such as fountain codes are a promising way to disseminate large bulks of data in a multicast manner over an unreliable medium. In this paper, the authors investigate how to conceal such an encoded data stream on its way to numerous receivers with a minimum investment. Compared...

    Provided By Reed Business Information

  • White Papers // Oct 2010

    Analytical Modeling of TCP Flow in Wireless LANs

    TCP (Transmission Control Protocol) is one of the protocols which are widely used in Internet environments. This paper presents an analytical model developed using the Stochastic Reward Net (SRN) modeling technique for the TCP flow behavior in WLANs. The purpose of developing an analytical model is the evaluation of stationary...

    Provided By Reed Business Information

  • White Papers // Aug 2010

    A Fluid Queue Modulated by Two Independent Birth - Death Processes

    The authors present a fluid queue model driven by two independent finite state birth - death processes with the objective to study the buffer occupancy distribution in any intermediate node in a communication network. In a communication network, at any node, the arrival and service of the packets are with...

    Provided By Reed Business Information

  • White Papers // Sep 2011

    An Efficient IP Address Lookup Algorithm Based on a Small Balanced Tree Using Entry Reduction

    Due to a tremendous increase in internet traffic, backbone routers must have the capability to forward massive incoming packets at several gigabits per second. IP address lookup is one of the most challenging tasks for high-speed packet forwarding. Some high-end routers have been implemented with hardware parallelism using Ternary Content...

    Provided By Reed Business Information

  • White Papers // Sep 2009

    Analysis of Network Processing Workloads

    Network processing is becoming an increasingly important paradigm as the Internet moves towards an architecture with more complex functionality in the data path. Modern routers not only forward packets, but also process headers and payloads to implement a variety of functions related to security, performance, and customization. It is important...

    Provided By Reed Business Information

  • White Papers // Dec 2008

    Transparent TCP Acceleration

    Transparent Transmission Control Protocol (TCP) acceleration is a technique to increase TCP throughput without requiring any changes in end-system TCP implementations. By intercepting and relaying TCP connections inside the network, long end-to-end feedback control loops can be broken into several smaller control loops. This decrease in feedback delay allows accelerated...

    Provided By Reed Business Information

  • White Papers // Apr 2010

    A Content-Guided Publish/subscribe Mechanism for Sensor Networks Without Location Information

    The publish/subscribe paradigm represents a large class of applications in sensor networks as sensors are designed mainly to detect and notify upon events of interests. Thus, it is important to design a publish/subscribe mechanism to enable such applications. Many existing solutions require that the sensor node locations be known, which...

    Provided By Reed Business Information

  • White Papers // Feb 2012

    Fine Grained Load Balancing in Multi-Hop Wireless Networks

    In this paper, the authors address the problem of local balancing in multi-hop wireless networks. They introduce the notion of proactive routing: after a short pre-processing phase in which nodes build their routing tables by exchanging messages with neighbors, they require that nodes decide the relay of each message without...

    Provided By Reed Business Information

  • White Papers // Jun 2012

    Generating Trusted Graphs for Trust Evaluation in Online Social Networks

    The authors propose a novel trust framework to address the issue of ''Can Alice trust Bob on a service?'' in large Online Social Networks (OSNs). Many models have been proposed for constructing and calculating trust. However, two common shortcomings make them less practical, especially in large OSNs: the information used...

    Provided By Reed Business Information

  • White Papers // Mar 2012

    Depth-Color Based 3D Image Transmission Over Wireless Networks With QoE Provisions

    The deployment of 3-D image techniques is one of the most promising fields among the development of new applications for natural image scenes. Driven by urgent demands from industry and users, 3-D image technology has received significant research attention in recent years. 3D image streaming gives users an extra dimension...

    Provided By Reed Business Information

  • White Papers // Jun 2011

    Playdoh: A Lightweight Python Library for Distributed Computing and Optimisation

    Parallel computing is now an essential paradigm for high-performance scientific computing. Most existing hardware and software solutions are expensive or difficult to use. The authors developed Playdoh, a Python library for distributing computations across the free computing units available in a small network of multi-core computers. Playdoh supports independent and...

    Provided By Reed Business Information

  • White Papers // Jul 2012

    Multicast with Cooperative Gateways in Multi-Channel Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are emerging as a promising solution for pervasive and cost-effective broadband connections. In this paper, the authors target high-throughput multicast that combats the interference and bandwidth limitation of wireless channels, which are particularly severe with wireless meshes. They suggest that they can be addressed by introducing...

    Provided By Reed Business Information

  • White Papers // Dec 2011

    Adaptive Service Provisioning for Enhanced Energy Efficiency and Flexibility in Wireless Sensor Networks

    Energy constraints and high connectivity dynamics render Wireless Sensor Networks (WSNs) difficult to program and use. Software applications must be coordinated not only functionally, as is traditionally done, but also in terms of resource utilization and adaptation to a dynamic environment. This paper presents Adaptive Servilla, a middleware that provides...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    Servilla: A Flexible Service Provisioning Middleware for Heterogeneous Sensor Networks

    Device heterogeneity in wireless sensor networks is rendering such networks increasingly difficult to program. To address this problem, the authors present Servilla, a novel middleware that enables applications to be both platform-independent and efficient despite executing over a diverse and dynamic set of devices. It achieves this by using service-oriented...

    Provided By Reed Business Information

  • White Papers // May 2012

    Cooperative Detection of Primary User Emulation Attacks in CRNs

    Cognitive Radio Networks (CRNs) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. With such purpose, coexistence mechanisms among CRN nodes or secondary users and legitimate users of the spectrum or primary users are defined. However, due to the particular features of...

    Provided By Reed Business Information

  • White Papers // Mar 2010

    A Workflow Net Similarity Measure Based on Transition Adjacency Relations

    Many activities in Business Process Management, such as process retrieval, process mining, and process integration, need to determine the similarity or the distance between two processes. Although several approaches have recently been proposed to measure the similarity between business processes, neither the definitions of the similarity notion between processes nor...

    Provided By Reed Business Information

  • White Papers // May 2008

    Change Patterns and Change Support Features - Enhancing Flexibility in Process-Aware Information Systems

    Companies increasingly adopt Process-Aware Information Systems (PAISs), which offer promising perspectives for more flexible enterprise computing. The emergence of different process support paradigms and the lack of methods for comparing existing approaches enabling PAIS changes have made the selection of adequate process management technology difficult. This paper suggests a set...

    Provided By Reed Business Information

  • White Papers // Mar 2013

    Conceptual Framework for Non-Hierarchical Business Networks for Complex Products Design and Manufacturing

    The effective creation and management of business networks is more and more an important contribution for the competitiveness and sustainability of European SMEs. In Non-hierarchical networks SMEs join their competencies and resources to grab profitable business opportunities. In these networks SMEs take the leading role and control the business instead...

    Provided By Reed Business Information

  • White Papers // Apr 2011

    Collaborative Business Networks: Evaluation of Technological Tools for Decision Support Making

    Now-a-days, companies are living great difficulties on managing their business due to constant and unpredictable economic market fluctuations. Recent changes in market trends (such as the constant demand for new products and services, mass customization and the drastic reduction of delivery time) lead companies to adopt strategies of creating partnerships...

    Provided By Reed Business Information

  • White Papers // Mar 2009

    A Web Services and Process-View Combined Approach for Process Management of Collaborative Product Development

    Collaborative Product Development (CPD) across enterprises has been recognized as an effective strategy to connect multi-enterprise wide project teams to develop more competitive products. Process management is vital to the successful implementation of CPD in a multi-enterprise environment. In this paper, a novel Web Services (WSs) and process-view combined approach...

    Provided By Reed Business Information

  • White Papers // Dec 2007

    A New Standard of On-Line Customer Service Process: Integrating Language-Action Into Blogs

    Blogging, which is a relatively new medium in personal communication and collaboration, can help enterprises overcome some difficulties in conventional customer service management. However, blog functions remain limited. This paper proposes a novel standard for managing customer service processes, in which language-action is integrated into blogs to leverage blog characteristics....

    Provided By Reed Business Information

  • White Papers // May 2006

    IT Support for Healthcare Processes - Premises, Challenges, Perspectives

    Healthcare processes require the cooperation of different organizational units and medical disciplines. In such an environment optimal process support becomes crucial. Though healthcare processes frequently change, and therefore the separation of the flow logic from the application code seems to be promising, workflow technology has not yet been broadly used...

    Provided By Reed Business Information

  • White Papers // May 2010

    Business Models as Models

    Drawing on research undertaken in the history and philosophy of science, with particular reference to the extensive literature which discusses the use of models in biology and economics, the authors explore the question 'Are business models useful?' They point out that they act as various forms of model: to provide...

    Provided By Reed Business Information

  • White Papers // Apr 2011

    Deriving Business Processes with Service Level Agreements from Early Requirements

    When designing a service-based business process employing loosely coupled services, one is not only interested in guaranteeing a certain flow of work, but also in how the work will be performed. This involves the consideration of non-functional properties which go from execution time and costs, to trust and security. Ideally,...

    Provided By Reed Business Information

  • White Papers // Dec 2010

    Addressing Cloud Computing Security Issues

    The recent emergence of cloud computing has drastically altered everyone's perception of infrastructure architectures, software delivery and development models. Projecting as an evolutionary step, following the transition from mainframe computers to client/server deployment models, cloud computing encompasses elements from grid computing, utility computing and autonomic computing, into an innovative deployment...

    Provided By Reed Business Information

  • White Papers // Jul 2010

    Process Discovery in Event Logs: An Application in the Telecom Industry

    The abundant availability of data is typical for information-intensive organizations. Usually, discerning knowledge from vast amounts of data is a challenge. Similarly, discovering Business Process Models from information system event logs is definitely non-trivial. Within the analysis of event logs, process discovery, which can be defined as the automated construction...

    Provided By Reed Business Information

  • White Papers // Mar 2010

    Modeling and Mining of Dynamic Trust in Complex Service-oriented Systems

    The global scale and distribution of companies have changed the economy and dynamics of businesses. Web-based collaborations and cross-organizational processes typically require dynamic and context-based interactions between people and services. However, finding the right partner to work on joint tasks or to solve emerging problems in such scenarios is challenging...

    Provided By Reed Business Information

  • White Papers // Aug 2006

    Interaction Pattern Detection in Process Oriented Information Systems

    Finding interaction patterns is a challenging problem, but this kind of information about processes or social networks might be useful for an organization's management to understand the role of specific persons in processes. Ad-hoc processes are of special interest, because they result from runtime-collaboration between the participants, not using predefined...

    Provided By Reed Business Information

  • White Papers // Feb 2010

    A Process-View Approach for Cross-Organizational Workflows Management

    Workflow management for cross-organizational business processes presents a significant challenge recently. The development and implementation of new methodologies and technologies are imperative to tackle this challenge. The process-view approach provides a promising way to facilitate cross-organizational workflows management, especially when it is combined with powerful workflow modeling methods. With the...

    Provided By Reed Business Information