Reed Business Information

Displaying 1-40 of 334 results

  • White Papers // May 2014

    Adaptive Preshuffling in Hadoop Clusters

    MapReduce has become an important distributed processing model for large-scale data-intensive applications like data mining and web indexing. Hadoop - an open-source implementation of MapReduce is widely used for short jobs requiring low response time. In this paper, the authors proposed a new preshuffling strategy in Hadoop to reduce high...

    Provided By Reed Business Information

  • White Papers // Apr 2014

    Optimal Sequential Wireless Relay Placement on a Random Lattice Path

    The authors' paper is motivated by impromptu (or \"As-you-go\") deployment of wireless relay nodes along a path, a need that arises in many situations. In this paper, the path is modeled as starting at the origin (where there is the data sink, e.g., the control center), and evolving randomly over...

    Provided By Reed Business Information

  • White Papers // Feb 2014

    Terahertz Band: Next Frontier for Wireless Communications

    In this paper, the authors provide an in-depth view of Terahertz band (0.1 - 10THz) communication, which is envisioned as a key technology to satisfy the increasing demand for higher speed wireless communication. THz band communication will alleviate the spectrum scarcity and capacity limitations of current wireless systems, and enable...

    Provided By Reed Business Information

  • White Papers // Jan 2014

    A Survey of Intrusion Detection in Wireless Network Applications

    Information systems are becoming more integrated into the people lives. As this integration deepens, the importance of securing these systems increases. Because of lower installation and maintenance costs, many of these systems are largely networked by wireless means. In order to identify gaps and propose research directions in wireless network...

    Provided By Reed Business Information

  • White Papers // Jan 2014

    EnhancedBit: Unleashing the Potential of the Unchoking Policy in the BitTorrent Protocol

    In this paper, the authors propose a modification to the BitTorrent protocol related to its peer unchoking policy. In particular, they apply a novel optimistic unchoking approach that improves the quality of inter-connections amongst peers, i.e., increases the number of directly-connected and interested-in-cooperation peers without penalizing underutilized and/or idle peers....

    Provided By Reed Business Information

  • White Papers // Dec 2013

    Resilience Articulation Point (RAP): Cross-Layer Dependability Modeling for Nanometer System-on-Chip Resilience

    The Resilience Articulation Point (RAP) model aims at provisioning researchers and developers with a probabilistic fault abstraction and error propagation framework covering all hardware/software layers of a System-on-Chip (SoC). RAP assumes that physically induced faults at the technology or CMOS device layer will eventually manifest themselves as a single or...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    Unified Reliability Estimation and Management of NoC Based Chip Multiprocessors

    The authors present a new architecture level unified reliability evaluation methodology for Chip Multi-Processors (CMPs). The proposed Reliability ESTimation (REST) is based on a Monte Carlo algorithm. What distinguishes REST from the previous work is that both the computational and communication components are considered in a unified manner to compute...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    LTE-Advanced and the Evolution to Beyond 4G (B4G) Systems

    Cellular networks have been undergoing an extraordinarily fast evolution in the past years. With commercial deployments of Release 8 (Rel-8) Long Term Evolution (LTE) already being carried out worldwide, a significant effort is being put forth by the research and standardization communities on the development and specification of LTE-advanced. The...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    Tibidabo: Making the Case for an ARM-Based HPC System

    It is widely accepted that future HPC systems will be limited by their power consumption. Current HPC systems are built from commodity server processors, designed over years to achieve maximum performance, with energy efficiency being an after-thought. In this paper, the authors advocate a different approach: building HPC systems from...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    Design Configuration Selection for Hard-Error Reliable Processors Via Statistical Rules

    Lifetime reliability is becoming a first-order concern in processor manufacturing in addition to conventional design goals including performance, power consumption and thermal features since semiconductor technology enters the deep submicron era. This paper requires computer architects to carefully examine each design option and evaluate its reliability, in order to prolong...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    A Two-Phase Design Space Exploration Strategy for System-Level Real-Time Application Mapping Onto MPSoC

    In this paper, the authors present a two-phase Design Space Exploration (DSE) approach to address the problem of real-time application mapping on a flexible MPSoC platform. Their approach is composed of two independent phases - analytical estimation/pruning and system simulation - communicating via a well-defined interface. The strength of the...

    Provided By Reed Business Information

  • White Papers // Oct 2013

    Computational Cost Analysis on Securing RFID Protocols Conforming to EPC Class-1 Generation-2 Standard

    A Radio Frequency IDentification (RFID) system is a contactless automatic identification system that uses small and low-cost tags. RFID systems communicate with the tags attached to the objects using radio frequency waves. The major problem with RFID systems is security problem because the communication between RFID components is wireless. In...

    Provided By Reed Business Information

  • White Papers // Oct 2013

    Demand-Based Schedulability Analysis for Real-Time Multi-Core Scheduling

    In real-time systems, schedulability analysis has been widely studied to provide offline guarantees on temporal correctness, producing many analysis methods. The demand-based schedulability analysis method has a great potential for high schedulability performance and broad applicability. However, such a potential is not yet fully realized for real-time multi-core scheduling mainly...

    Provided By Reed Business Information

  • White Papers // Oct 2013

    The COMPLEX Methodology for UML/MARTE Modeling and Design Space Exploration of Embedded Systems

    The design of embedded systems is in a highly competitive context. The translation of an efficient design into a successful product highly depends on becoming the first product in the market with new complex functionalities fulfilling tight performance constraints, and at an affordable price. In this paper, the task of...

    Provided By Reed Business Information

  • White Papers // Sep 2013

    Onion Routing Circuit Construction Via Latency Graphs

    The use of anonymity-based infrastructures and anonymisers is a plausible solution to mitigate privacy problems on the Internet. Tor (short for the onion router) is a popular low-latency anonymity system that can be installed as an end-user application on a wide range of operating systems to redirect the traffic through...

    Provided By Reed Business Information

  • White Papers // Sep 2013

    DeSyRe: On-Demand System Reliability

    The DeSyRe project builds on-demand adaptive and reliable Systems-on-Chips (SoCs). As fabrication technology scales down, chips are becoming less reliable, thereby incurring increased power and performance costs for fault tolerance. To make matters worse, power density is becoming a significant limiting factor in SoC design, in general. In the face...

    Provided By Reed Business Information

  • White Papers // Sep 2013

    Multi-Objective Scheduling of Many Tasks in Cloud Platforms

    The scheduling of a many-task workflow in a distributed computing platform is a well known NP-hard problem. The problem is even more complex and challenging when the virtualized clusters are used to execute a large number of tasks in a cloud computing platform. The difficulty lies in satisfying multiple objectives...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    A Survey on Vehicular Cloud Computing

    Vehicular networking has become a significant research area due to its specific features and applications such as standardization, efficient traffic management, road safety and infotainment. Vehicles are expected to carry relatively more communication systems, on board computing facilities, storage and increased sensing power. Hence, several technologies have been deployed to...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    SE-AKA: A Secure and Efficient Group Authentication and Key Agreement Protocol for LTE Networks

    To support Evolved Packet System (EPS) in the Long Term Evolution (LTE) networks, the 3rd Generation Partnership Project (3GPP) has proposed an Authentication and Key Agreement (AKA) protocol, named EPS-AKA, which has become an emerging standard for Fourth-Generation (4G) wireless communications. However, due to the requirement of backward compatibility, EPS-AKA...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    Online Scheduling and Placement of Hardware Tasks With Multiple Variants on Dynamically Reconfigurable Field-Programmable Gate Arrays

    Hardware task scheduling and placement at runtime plays a crucial role in achieving better system performance by exploring dynamically reconfigurable Field-Programmable Gate Arrays (FPGAs). Although a number of online algorithms have been proposed in the literature, no strategy has been engaged in efficient usage of reconfigurable resources by orchestrating multiple...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    A System-Level Approach to Adaptivity and Fault-Tolerance in NoC-Based MPSoCs: The MADNESS Project

    Modern embedded systems increasingly require adaptive run-time management of available resources. One method for supporting adaptively is to implement run-time application mapping. The system may adapt the mapping of the applications in order to accommodate the current workload conditions, to balance the computing load for efficient resource utilization, to meet...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Analysis of the Impact of Spatial and Temporal Variations on the Stability of SRAM Arrays and the Mitigation Technique Using Independent-Gate Devices

    As planar MOSFET is approaching its physical scaling limits, FinFET becomes one of the most promising alternative structures to keep on the industry scaling-down trend for future technology generations of 22nm and beyond. In this paper, the authors investigate the influence of NBTI degradation induced variation and random process variations...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Compiling Scilab to High Performance Embedded Multicore Systems

    Efficient, flexible, and high performance chips are needed. Many performance-critical applications (e.g. digital video processing, telecoms, and security applications) that need to process huge amounts of data in a short time would benefit from these attributes. The mapping process of high performance embedded applications to today's Multi-Processor System-on-Chip (MPSoC) devices...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    A Unified Execution Model for Multiple Computation Models of Streaming Applications on a Composable MPSoC

    In this paper, the authors propose a unified model of execution that aims to fill the abstraction level gap between the primitives of models of computation and the ones of an MPSoC. This paper targets a composable MPSoC platform and supports the sequential, Kahn process networks, and dataflow models. Their...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Efficient Multi-Keyword Ranked Query Over Encrypted Data in Cloud Computing

    Cloud computing infrastructure is a promising new technology and greatly accelerates the development of large scale data storage, processing and distribution. However, security and privacy become major concerns when data owners outsource their private data onto public cloud servers that are not within their trusted management domains. To avoid information...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    An Integrated, Programming Model-Driven Framework for NoC-QoS Support in Cluster-Based Embedded Many-Cores

    Embedded SoC designs are embracing the many-core paradigm to deliver the required performance to run an ever-increasing number of applications in parallel. Networks-on-Chip (NoC) are considered as a convenient technology to implement many-core embedded platforms. The complex and non-uniform nature of the traffic flows generated when multiple parallel applications are...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Privacy-Preserving Smart Metering with Multiple Data Consumers

    The increasing diffusion of Automatic Meter Reading (AMR) and the possibility to open the system to third party services has raised many concerns about the protection of personal data related to energy, water or gas consumption, from which details about the habits of the users can be inferred. This paper...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    OpenMOLE, a Workflow Engine Specifically Tailored for the Distributed Exploration of Simulation Models

    Complex-systems describe multiple levels of collective structure and organization. In such systems, the emergence of global behavior from local interactions is generally studied through large scale experiments on numerical models. This analysis generates important computation loads which require the use of multi-core servers, clusters or grid computing. Dealing with such...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Thermal Aware Overall Energy Minimization Scheduling for Hardreal-Time Systems

    As the semiconductor technology proceeds into the deep sub-micron era, the leakage and its dependency with the temperature become critical in dealing with power/energy minimization problems. In this paper, the authors study the problem on how to schedule a hard real-time system to achieve the minimal overall energy, including both...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Efficient Multicast Schemes for 3-D Networks-on-Chip

    3-D Network-on-Chips (NoCs) have been proposed as a potent solution to address both the interconnection and design complexity problems facing future System-on-Chip (SoC) designs. In this paper, two topology-aware multicast routing algorithms, Multicasting XYZ (MXYZ) and ALternative XYZ (AL + XYZ) algorithms in supporting of 3-D NoC are proposed. In...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Controlling a Complete Hardware Synthesis Toolchain With LARA Aspects

    The synthesis and mapping of applications to configurable embedded systems is a notoriously complex process. Design-flows typically include tools that have a wide range of parameters which interact in very unpredictable ways, thus creating a large and complex design space. When exploring this space, designers must manage the interfaces between...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Exploiting Domain Knowledge in System-Level MPSoC Design Space Exploration

    System-level Design Space Exploration (DSE), which is performed early in the design process, is of eminent importance to the design of complex multi-processor embedded multimedia systems. During system-level DSE, system parameters like, e.g., the number and type of processors, and the mapping of application tasks to architectural resources, are considered....

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Limited Carry-In Technique for Real-Time Multi-Core Scheduling

    Schedulability analysis has been widely studied to provide offline timing guarantees for a set of real-time tasks. The so-called limited carry-in technique, which can be orthogonally incorporated into many different multi-core schedulability analysis methods, was originally introduced for Earliest Deadline First (EDF) scheduling to derive a tighter bound on the...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Energy-Aware Simulation with DVFS

    In recent years, research has been conducted in the area of large systems models, especially distributed systems, to analyze and understand their behavior. Simulators are now commonly used in this area and are becoming more complex. Most of them provide frameworks for simulating application scheduling in various grid infrastructures, others...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    A Novel Batch-Based Group Key Management Protocol Applied to the Internet of Things

    Many applications for ad hoc networks are based on a point-to-multipoint (multicast) communication paradigm, where a single source sends common data to many receivers, or, inversely, on a multipoint-to-point communication paradigm, where multiple sources send data to a single receiver. In such scenarios, communication can be secured by adopting a...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Avoiding Request - Request Type Message-Dependent Deadlocks in Networks-on-Chips

    When an application is running on a Network-on-Chip (NoC)-based Multi-Processor System-on-Chip (MPSoC), two types of deadlocks may occur: the routing-dependent deadlocks and the message-dependent deadlocks. The former type of deadlocks can be avoided by removing any cyclic paths on the application's channel dependency graph. The message dependent deadlocks, caused by...

    Provided By Reed Business Information

  • White Papers // May 2013

    ARTE: An Application-Specific Run-Time ManagEment Framework for Multi-Cores Based on Queuing Models

    In this paper, the authors present an Application-specific Run-Time managEment (ARTE) framework to tackle the problem of managing computational resources in an application specific multi-core system. The ARTE framework run-time goal is to minimize applications' response times while meeting the applications' computational demands and fitting within the available power budget....

    Provided By Reed Business Information

  • White Papers // May 2013

    Two-Level Caches Tuning Technique for Energy Consumption in Reconfigurable Embedded MPSoC

    In order to meet the ever-increasing computing requirement in the embedded market, multiprocessor chips were proposed as the best way out. In this paper, the authors investigate the energy consumption in these embedded MPSoC systems. One of the efficient solutions to reduce the energy consumption is to reconfigure the cache...

    Provided By Reed Business Information

  • White Papers // May 2013

    Optimizing Two-Dimensional DMA Transfers for Scratchpad Based MPSoCs Platforms

    Reducing the effects of off-chip memory access latency is a key factor in exploiting efficiently embedded multi-core platforms. The authors consider architectures that admit a multi-core computation fabric, having its own fast and small memory to which the data blocks to be processed are fetched from external memory using a...

    Provided By Reed Business Information

  • White Papers // May 2013

    DocCloud: A Document Recommender System on Cloud Computing With Plausible Deniability

    Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. Little work has been done regarding secure recommender systems or how to cope with the legal...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    Managing Is Knowing Your People

    Conaty ran HR for GE under Jack Welch. He says Welch knew the top 600 people intimately. He knew their families, their hobbies, their preferences, their strengths and their weaknesses. That is an incredibly high number; but Conaty assures it is accurate and it is that incredible dedication to knowing...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    Sustaining Through Succession

    Management-succession planning requires contemplation of one's own mortality which is unpleasant, leading to many business owners choosing to do very little formal planning when it actually comes to selecting and grooming successors, says Deloitte tax partner, Craig Holland. Executing an effective succession strategy can take, on average, between three and...

    Provided By Reed Business Information

  • White Papers // Jun 2010

    The Returns On Engagement

    Talent management describes a wide range of activities, and not all positive. Most employers have already frozen or restrained hiring and many have downsized their workforce. While both are at times necessary, it is the contention that the largest opportunity for corporate performance improvement lies in engaging the workforce to...

    Provided By Reed Business Information

  • White Papers // Sep 2008

    Secrets Of Senior Management Buy-In

    When considering the implementation of a HR management system, the topic of senior management buy-in often raises its head. This is common not only in situations where a company is changing a software system but also where any fundamental change in company practice is involved. As such, the theories and...

    Provided By Reed Business Information

  • White Papers // Apr 2004

    Drugs And Alcohol: Testing Issues

    There was also a pre-existing policy of having a drug and alcohol-free workplace. John Dawes, project manager health standards for RailCorp says the recent regulation and legislation had been long anticipated. "The legislation means employees can now be tested after they have started work as well, and one can also...

    Provided By Reed Business Information

  • White Papers // Nov 2004

    New Shade of Federalism

    In recent years, sustainable design has become a primary component of design excellence in GSA projects. Since 2003, the GSA has required all its buildings to receive certification (or, better still, a Silver rating) through the U.S. Green Building Council's LEED green-building rating program. This article describes how the Federal...

    Provided By Reed Business Information

  • White Papers // Jun 2009

    Talent Strategy Must Be In Place

    Even at a time of economic uncertainty, talent continues to be a corporate pre-occupation. Chief executives want to be sure they have the best people to lead them through the downturn to eventual recovery. But there is plenty of evidence that talent management is simply not hitting the spot. Every...

    Provided By Reed Business Information

  • White Papers // Dec 2011

    Adaptive Service Provisioning for Enhanced Energy Efficiency and Flexibility in Wireless Sensor Networks

    Energy constraints and high connectivity dynamics render Wireless Sensor Networks (WSNs) difficult to program and use. Software applications must be coordinated not only functionally, as is traditionally done, but also in terms of resource utilization and adaptation to a dynamic environment. This paper presents Adaptive Servilla, a middleware that provides...

    Provided By Reed Business Information

  • White Papers // May 2012

    An Energy-Centric Handover Decision Algorithm for the Integrated LTE Macrocell - Femtocell Network

    Femtocells are attracting a fast increasing interest now-a-days, as a promising solution to improve indoor coverage and system capacity. Due to the short transmit-receive distance, femtocells can greatly lower transmit power, prolong handset battery life, and enhance the user-perceived Quality of Service (QoS). On the other hand, technical challenges still...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    Servilla: A Flexible Service Provisioning Middleware for Heterogeneous Sensor Networks

    Device heterogeneity in wireless sensor networks is rendering such networks increasingly difficult to program. To address this problem, the authors present Servilla, a novel middleware that enables applications to be both platform-independent and efficient despite executing over a diverse and dynamic set of devices. It achieves this by using service-oriented...

    Provided By Reed Business Information

  • White Papers // May 2012

    Cooperative Detection of Primary User Emulation Attacks in CRNs

    Cognitive Radio Networks (CRNs) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. With such purpose, coexistence mechanisms among CRN nodes or secondary users and legitimate users of the spectrum or primary users are defined. However, due to the particular features of...

    Provided By Reed Business Information

  • White Papers // Jul 2012

    Multicast with Cooperative Gateways in Multi-Channel Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are emerging as a promising solution for pervasive and cost-effective broadband connections. In this paper, the authors target high-throughput multicast that combats the interference and bandwidth limitation of wireless channels, which are particularly severe with wireless meshes. They suggest that they can be addressed by introducing...

    Provided By Reed Business Information

  • White Papers // Feb 2012

    Fine Grained Load Balancing in Multi-Hop Wireless Networks

    In this paper, the authors address the problem of local balancing in multi-hop wireless networks. They introduce the notion of proactive routing: after a short pre-processing phase in which nodes build their routing tables by exchanging messages with neighbors, they require that nodes decide the relay of each message without...

    Provided By Reed Business Information

  • White Papers // Jun 2011

    Playdoh: A Lightweight Python Library for Distributed Computing and Optimisation

    Parallel computing is now an essential paradigm for high-performance scientific computing. Most existing hardware and software solutions are expensive or difficult to use. The authors developed Playdoh, a Python library for distributing computations across the free computing units available in a small network of multi-core computers. Playdoh supports independent and...

    Provided By Reed Business Information

  • White Papers // Mar 2012

    Depth-Color Based 3D Image Transmission Over Wireless Networks With QoE Provisions

    The deployment of 3-D image techniques is one of the most promising fields among the development of new applications for natural image scenes. Driven by urgent demands from industry and users, 3-D image technology has received significant research attention in recent years. 3D image streaming gives users an extra dimension...

    Provided By Reed Business Information

  • White Papers // Jun 2012

    Generating Trusted Graphs for Trust Evaluation in Online Social Networks

    The authors propose a novel trust framework to address the issue of ''Can Alice trust Bob on a service?'' in large Online Social Networks (OSNs). Many models have been proposed for constructing and calculating trust. However, two common shortcomings make them less practical, especially in large OSNs: the information used...

    Provided By Reed Business Information

  • White Papers // Mar 2012

    Almost Optimal Distributed M2M Multicasting in Wireless Mesh Networks

    Wireless Mesh Networking (WMN) is an emerging communication paradigm to enable resilient, cost-efficient and reliable services for the future-generation wireless networks. In this paper, the authors study the problem of Multipoint-To-Multipoint (M2M) multicasting in a WMN which aims to use the minimum number of time slots to exchange messages among...

    Provided By Reed Business Information

  • White Papers // Dec 2011

    Coordination of Multi-Link Spectrum Handoff in Multi-Radio Multi-Hop Cognitive Networks

    In cognitive networks, spectrum handoff occurs when primary users reclaim their rights to access their licensed spectrum. When links perform spectrum handoff, their communication may be interrupted for a certain period and incurs spectrum handoff delay. Existing work only considered the problem of minimizing spectrum handoff delay of a single...

    Provided By Reed Business Information

  • White Papers // Dec 2010

    Dynamic Demultiplexing in Network Calculus - Theory and Application

    During the last two decades, starting with the seminal work by Cruz, network calculus has evolved as a new theory for the performance analysis of networked systems. In contrast to classical queuing theory, it deals with performance bounds instead of average values and thus has been the theoretical basis of...

    Provided By Reed Business Information

  • White Papers // Jan 2012

    A Secure Cookie Scheme

    Cookies are the primary means for web applications to authenticate HTTP requests and to maintain client states. Many web applications (such as those for electronic commerce) demand a secure cookie scheme. Such a scheme needs to provide the following four services: authentication, confidentiality, integrity, and anti-replay. Several secure cookie schemes...

    Provided By Reed Business Information

  • White Papers // Aug 2012

    QuARES: A Quality-Aware Renewable Energy-Driven Sensing Framework

    Renewable energy technologies have become a promising solution to reduce energy concerns that arise due to limited battery in wireless sensor networks. While this enables one to prolong the lifetime of a sensor network (perpetually), the realization of sustainable sensor platforms is challenging due to the unstable nature of environmental...

    Provided By Reed Business Information

  • White Papers // Jan 2013

    SIPAD: SIP - VoIP Anomaly Detection Using a Stateful Rule Tree

    Voice over IP (VoIP) services has become prevalent lately because of their potential advantages such as economic efficiency and useful features. Meanwhile, Session Initiation Protocol (SIP) is being widely used as a session protocol for the VoIP services. Many mobile VoIP applications have recently been launched, and they are becoming...

    Provided By Reed Business Information

  • White Papers // Jul 2011

    Identifying Botnets by Capturing Group Activities in DNS Traffic

    Botnets have become the main vehicle to conduct online crimes such as DDoS, spam, phishing and identity theft. Even though numerous efforts have been directed towards detection of botnets, evolving evasion techniques easily thwart detection. Moreover, existing approaches can be overwhelmed by the large amount of data needed to be...

    Provided By Reed Business Information

  • White Papers // Dec 2011

    Dynamic Circuit Provisioning in All-Optical WDM Networks Using Lightpath Switching

    In this paper, the authors investigate the problem of provisioning Holding-Time-Aware (HTA) dynamic circuits in all-optical Wavelength Division Multiplexed (WDM) networks. They employ a technique called Light-Path Switching (LPS) wherein the data transmission may begin on one light-path and switch to a different light-path at a later time. Light-path switches...

    Provided By Reed Business Information

  • White Papers // Dec 2012

    Building a Reliable and High-Performance Content-Based Publish/subscribe System

    Provisioning reliability in a high-performance content-based publish/subscribe system is a challenging problem. The inherent complexity of content-based routing makes message loss detection and recovery, and network state recovery extremely complicated. Existing proposals either try to reduce the complexity of handling failures in a traditional network architecture, which only partially address...

    Provided By Reed Business Information

  • White Papers // Sep 2012

    An Efficient Critical Protection Scheme for Intra-Domain Routing Using Link Characteristics

    In recent years, there are substantial demands to reduce packet loss on the Internet. Among the proposed schemes, finding backup paths in advance is considered to be an effective method to reduce the reaction time. Very commonly, a backup path is chosen to be the most disjoint path from the...

    Provided By Reed Business Information

  • White Papers // Oct 2012

    A Two Phased Service Oriented Broker for Replica Selection in Data Grids

    Replica selection is one of the fundamental problems in Data Grid's environment. This paper's concern is designing a Two phased Service Oriented Broker (2SOB) for replica selection. It is focused on investigating, selecting, modifying, and experimenting with some non-conventional approaches to be applied on the relevant selection techniques. The motivation...

    Provided By Reed Business Information

  • White Papers // Jul 2012

    Characterizing Spot Price Dynamics in Public Cloud Environments

    The surge in demand for utilizing public Cloud resources has introduced many trade-offs between price, performance and recently reliability. Amazon's Spot Instances (SIs) create a competitive bidding option for public Cloud users at lower prices without providing reliability on services. It is generally believed that SIs reduce monetary cost to...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    An Effective 3-in-1 Keyword Search Method Over Heterogeneous Data Sources

    Conventional keyword search engines are restricted to a given data model and cannot easily adapt to unstructured, semi-structured or structured data. In this paper, the authors propose an efficient and adaptive keyword search method, called EASE, for indexing and querying large collections of heterogeneous data. To achieve high efficiency in...

    Provided By Reed Business Information

  • White Papers // Sep 2011

    GPS Signal Acquisition via Compressive Multichannel Sampling

    In this paper, the authors propose an efficient acquisition scheme for GPS receivers. It is shown that GPS signals can be effectively sampled and detected using a bank of randomized correlators with much fewer chip-matched filters than those used in existing GPS signal acquisition algorithms. The latter use correlations with...

    Provided By Reed Business Information

  • White Papers // Mar 2009

    Providing Secure Execution Environments with a Last Line of Defense Against Trojan Circuit Attacks

    Integrated Circuits (ICs) are often produced in foundries that lack effective security controls. In these foundries, sophisticated attackers are able to insert malicious Trojan circuits that are easily hidden in the large, complex circuitry that comprises modern ICs. These so-called Trojan circuits are capable of launching attacks directly in hardware,...

    Provided By Reed Business Information

  • White Papers // Nov 2009

    Private Location-Based Information Retrieval Through User Collaboration

    Privacy and security are paramount in the proper deployment of Location-Based Services (LBSs). The authors present a novel protocol based on user collaboration to privately retrieve location-based information from an LBS provider. Their approach does not assume that users or providers can be completely trusted with regard to privacy, and...

    Provided By Reed Business Information

  • White Papers // Feb 2011

    Evaluation Systems and Methods of Enterprise Informatization and Its Application

    An efficient evaluation index system and evaluation method for enterprise informatization is critically important for guiding the implementation and development tasks of enterprise information systems. This paper, based on pre-research for a group of typical enterprises and item, factor and reliability analysis of acquired samples, presents a comprehensive evaluation index...

    Provided By Reed Business Information

  • White Papers // Aug 2011

    New Model and Heuristics for Safety Stock Placement in General Acyclic Supply Chain Networks

    The authors model the safety stock placement problem in general acyclic supply chain networks as a project scheduling problem, for which the Constraint Programming (CP) techniques are both effective and efficient in finding high quality solutions. They further integrate CP with a Genetic Algorithm (GA), which improves the CP solution...

    Provided By Reed Business Information

  • White Papers // Dec 2010

    A Novel Statistical Time-Series Pattern Based Interval Forecasting Strategy for Activity Durations in Workflow Systems

    Forecasting workflow activity durations is of great importance to support satisfactory QoS in workflow systems. Traditionally, a workflow system is often designed to facilitate the process automation in a specific application domain where activities are of the similar nature. Hence, a particular forecasting strategy is employed by a workflow system...

    Provided By Reed Business Information

  • White Papers // Jan 2008

    On-Demand e-Supply Chain Integration: A Multi-Agent Constraint-Based Approach

    With e-business emerging as a key enabler to drive supply chains, the focus of supply chain management has been shifted from production efficiency to customer-driven and partnership synchronization approaches. This strategic shift depends on the match between the demands and offerings that deliver the services. To achieve this, users need...

    Provided By Reed Business Information

  • White Papers // Aug 2009

    Acquiring Knowledge on Business Processes from Stakeholders' Stories

    Business Process Modeling is expensive and time consuming. It largely depends on the elicitation method and the person in charge. The model needs to be shared in order to promote multiple perspectives. This paper describes a group storytelling approach as an alternative to the traditional individual interviews to elicitate processes....

    Provided By Reed Business Information

  • White Papers // Feb 2009

    On Managing Business Processes Variants

    Variance in business process execution can be the result of several situations, such as disconnection between documented models and business operations, workarounds in spite of process execution engines, dynamic change and exception handling, flexible and ad-hoc requirements, and collaborative and/or knowledge intensive work. It is imperative that effective support for...

    Provided By Reed Business Information

  • White Papers // Dec 2007

    A New Standard of On-Line Customer Service Process: Integrating Language-Action Into Blogs

    Blogging, which is a relatively new medium in personal communication and collaboration, can help enterprises overcome some difficulties in conventional customer service management. However, blog functions remain limited. This paper proposes a novel standard for managing customer service processes, in which language-action is integrated into blogs to leverage blog characteristics....

    Provided By Reed Business Information

  • White Papers // Mar 2009

    A Web Services and Process-View Combined Approach for Process Management of Collaborative Product Development

    Collaborative Product Development (CPD) across enterprises has been recognized as an effective strategy to connect multi-enterprise wide project teams to develop more competitive products. Process management is vital to the successful implementation of CPD in a multi-enterprise environment. In this paper, a novel Web Services (WSs) and process-view combined approach...

    Provided By Reed Business Information