Reed Business Information

Displaying 1-40 of 338 results

  • White Papers // May 2014

    Adaptive Preshuffling in Hadoop Clusters

    MapReduce has become an important distributed processing model for large-scale data-intensive applications like data mining and web indexing. Hadoop - an open-source implementation of MapReduce is widely used for short jobs requiring low response time. In this paper, the authors proposed a new preshuffling strategy in Hadoop to reduce high...

    Provided By Reed Business Information

  • White Papers // Jan 2014

    A Survey of Intrusion Detection in Wireless Network Applications

    Information systems are becoming more integrated into the people lives. As this integration deepens, the importance of securing these systems increases. Because of lower installation and maintenance costs, many of these systems are largely networked by wireless means. In order to identify gaps and propose research directions in wireless network...

    Provided By Reed Business Information

  • White Papers // Dec 2013

    Resilience Articulation Point (RAP): Cross-Layer Dependability Modeling for Nanometer System-on-Chip Resilience

    The Resilience Articulation Point (RAP) model aims at provisioning researchers and developers with a probabilistic fault abstraction and error propagation framework covering all hardware/software layers of a System-on-Chip (SoC). RAP assumes that physically induced faults at the technology or CMOS device layer will eventually manifest themselves as a single or...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    Unified Reliability Estimation and Management of NoC Based Chip Multiprocessors

    The authors present a new architecture level unified reliability evaluation methodology for Chip Multi-Processors (CMPs). The proposed Reliability ESTimation (REST) is based on a Monte Carlo algorithm. What distinguishes REST from the previous work is that both the computational and communication components are considered in a unified manner to compute...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    Tibidabo: Making the Case for an ARM-Based HPC System

    It is widely accepted that future HPC systems will be limited by their power consumption. Current HPC systems are built from commodity server processors, designed over years to achieve maximum performance, with energy efficiency being an after-thought. In this paper, the authors advocate a different approach: building HPC systems from...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    Design Configuration Selection for Hard-Error Reliable Processors Via Statistical Rules

    Lifetime reliability is becoming a first-order concern in processor manufacturing in addition to conventional design goals including performance, power consumption and thermal features since semiconductor technology enters the deep submicron era. This paper requires computer architects to carefully examine each design option and evaluate its reliability, in order to prolong...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    A Two-Phase Design Space Exploration Strategy for System-Level Real-Time Application Mapping Onto MPSoC

    In this paper, the authors present a two-phase Design Space Exploration (DSE) approach to address the problem of real-time application mapping on a flexible MPSoC platform. Their approach is composed of two independent phases - analytical estimation/pruning and system simulation - communicating via a well-defined interface. The strength of the...

    Provided By Reed Business Information

  • White Papers // Oct 2013

    Demand-Based Schedulability Analysis for Real-Time Multi-Core Scheduling

    In real-time systems, schedulability analysis has been widely studied to provide offline guarantees on temporal correctness, producing many analysis methods. The demand-based schedulability analysis method has a great potential for high schedulability performance and broad applicability. However, such a potential is not yet fully realized for real-time multi-core scheduling mainly...

    Provided By Reed Business Information

  • White Papers // Oct 2013

    Computational Cost Analysis on Securing RFID Protocols Conforming to EPC Class-1 Generation-2 Standard

    A Radio Frequency IDentification (RFID) system is a contactless automatic identification system that uses small and low-cost tags. RFID systems communicate with the tags attached to the objects using radio frequency waves. The major problem with RFID systems is security problem because the communication between RFID components is wireless. In...

    Provided By Reed Business Information

  • White Papers // Oct 2013

    The COMPLEX Methodology for UML/MARTE Modeling and Design Space Exploration of Embedded Systems

    The design of embedded systems is in a highly competitive context. The translation of an efficient design into a successful product highly depends on becoming the first product in the market with new complex functionalities fulfilling tight performance constraints, and at an affordable price. In this paper, the task of...

    Provided By Reed Business Information

  • White Papers // Sep 2013

    Onion Routing Circuit Construction Via Latency Graphs

    The use of anonymity-based infrastructures and anonymisers is a plausible solution to mitigate privacy problems on the Internet. Tor (short for the onion router) is a popular low-latency anonymity system that can be installed as an end-user application on a wide range of operating systems to redirect the traffic through...

    Provided By Reed Business Information

  • White Papers // Sep 2013

    DeSyRe: On-Demand System Reliability

    The DeSyRe project builds on-demand adaptive and reliable Systems-on-Chips (SoCs). As fabrication technology scales down, chips are becoming less reliable, thereby incurring increased power and performance costs for fault tolerance. To make matters worse, power density is becoming a significant limiting factor in SoC design, in general. In the face...

    Provided By Reed Business Information

  • White Papers // Sep 2013

    Multi-Objective Scheduling of Many Tasks in Cloud Platforms

    The scheduling of a many-task workflow in a distributed computing platform is a well known NP-hard problem. The problem is even more complex and challenging when the virtualized clusters are used to execute a large number of tasks in a cloud computing platform. The difficulty lies in satisfying multiple objectives...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    A Survey on Vehicular Cloud Computing

    Vehicular networking has become a significant research area due to its specific features and applications such as standardization, efficient traffic management, road safety and infotainment. Vehicles are expected to carry relatively more communication systems, on board computing facilities, storage and increased sensing power. Hence, several technologies have been deployed to...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    SE-AKA: A Secure and Efficient Group Authentication and Key Agreement Protocol for LTE Networks

    To support Evolved Packet System (EPS) in the Long Term Evolution (LTE) networks, the 3rd Generation Partnership Project (3GPP) has proposed an Authentication and Key Agreement (AKA) protocol, named EPS-AKA, which has become an emerging standard for Fourth-Generation (4G) wireless communications. However, due to the requirement of backward compatibility, EPS-AKA...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    Online Scheduling and Placement of Hardware Tasks With Multiple Variants on Dynamically Reconfigurable Field-Programmable Gate Arrays

    Hardware task scheduling and placement at runtime plays a crucial role in achieving better system performance by exploring dynamically reconfigurable Field-Programmable Gate Arrays (FPGAs). Although a number of online algorithms have been proposed in the literature, no strategy has been engaged in efficient usage of reconfigurable resources by orchestrating multiple...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    A System-Level Approach to Adaptivity and Fault-Tolerance in NoC-Based MPSoCs: The MADNESS Project

    Modern embedded systems increasingly require adaptive run-time management of available resources. One method for supporting adaptively is to implement run-time application mapping. The system may adapt the mapping of the applications in order to accommodate the current workload conditions, to balance the computing load for efficient resource utilization, to meet...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Analysis of the Impact of Spatial and Temporal Variations on the Stability of SRAM Arrays and the Mitigation Technique Using Independent-Gate Devices

    As planar MOSFET is approaching its physical scaling limits, FinFET becomes one of the most promising alternative structures to keep on the industry scaling-down trend for future technology generations of 22nm and beyond. In this paper, the authors investigate the influence of NBTI degradation induced variation and random process variations...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    A Unified Execution Model for Multiple Computation Models of Streaming Applications on a Composable MPSoC

    In this paper, the authors propose a unified model of execution that aims to fill the abstraction level gap between the primitives of models of computation and the ones of an MPSoC. This paper targets a composable MPSoC platform and supports the sequential, Kahn process networks, and dataflow models. Their...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Compiling Scilab to High Performance Embedded Multicore Systems

    Efficient, flexible, and high performance chips are needed. Many performance-critical applications (e.g. digital video processing, telecoms, and security applications) that need to process huge amounts of data in a short time would benefit from these attributes. The mapping process of high performance embedded applications to today's Multi-Processor System-on-Chip (MPSoC) devices...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Efficient Multi-Keyword Ranked Query Over Encrypted Data in Cloud Computing

    Cloud computing infrastructure is a promising new technology and greatly accelerates the development of large scale data storage, processing and distribution. However, security and privacy become major concerns when data owners outsource their private data onto public cloud servers that are not within their trusted management domains. To avoid information...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    An Integrated, Programming Model-Driven Framework for NoC-QoS Support in Cluster-Based Embedded Many-Cores

    Embedded SoC designs are embracing the many-core paradigm to deliver the required performance to run an ever-increasing number of applications in parallel. Networks-on-Chip (NoC) are considered as a convenient technology to implement many-core embedded platforms. The complex and non-uniform nature of the traffic flows generated when multiple parallel applications are...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Privacy-Preserving Smart Metering with Multiple Data Consumers

    The increasing diffusion of Automatic Meter Reading (AMR) and the possibility to open the system to third party services has raised many concerns about the protection of personal data related to energy, water or gas consumption, from which details about the habits of the users can be inferred. This paper...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    OpenMOLE, a Workflow Engine Specifically Tailored for the Distributed Exploration of Simulation Models

    Complex-systems describe multiple levels of collective structure and organization. In such systems, the emergence of global behavior from local interactions is generally studied through large scale experiments on numerical models. This analysis generates important computation loads which require the use of multi-core servers, clusters or grid computing. Dealing with such...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Thermal Aware Overall Energy Minimization Scheduling for Hardreal-Time Systems

    As the semiconductor technology proceeds into the deep sub-micron era, the leakage and its dependency with the temperature become critical in dealing with power/energy minimization problems. In this paper, the authors study the problem on how to schedule a hard real-time system to achieve the minimal overall energy, including both...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Efficient Multicast Schemes for 3-D Networks-on-Chip

    3-D Network-on-Chips (NoCs) have been proposed as a potent solution to address both the interconnection and design complexity problems facing future System-on-Chip (SoC) designs. In this paper, two topology-aware multicast routing algorithms, Multicasting XYZ (MXYZ) and ALternative XYZ (AL + XYZ) algorithms in supporting of 3-D NoC are proposed. In...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Controlling a Complete Hardware Synthesis Toolchain With LARA Aspects

    The synthesis and mapping of applications to configurable embedded systems is a notoriously complex process. Design-flows typically include tools that have a wide range of parameters which interact in very unpredictable ways, thus creating a large and complex design space. When exploring this space, designers must manage the interfaces between...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Exploiting Domain Knowledge in System-Level MPSoC Design Space Exploration

    System-level Design Space Exploration (DSE), which is performed early in the design process, is of eminent importance to the design of complex multi-processor embedded multimedia systems. During system-level DSE, system parameters like, e.g., the number and type of processors, and the mapping of application tasks to architectural resources, are considered....

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Limited Carry-In Technique for Real-Time Multi-Core Scheduling

    Schedulability analysis has been widely studied to provide offline timing guarantees for a set of real-time tasks. The so-called limited carry-in technique, which can be orthogonally incorporated into many different multi-core schedulability analysis methods, was originally introduced for Earliest Deadline First (EDF) scheduling to derive a tighter bound on the...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Energy-Aware Simulation with DVFS

    In recent years, research has been conducted in the area of large systems models, especially distributed systems, to analyze and understand their behavior. Simulators are now commonly used in this area and are becoming more complex. Most of them provide frameworks for simulating application scheduling in various grid infrastructures, others...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Avoiding Request - Request Type Message-Dependent Deadlocks in Networks-on-Chips

    When an application is running on a Network-on-Chip (NoC)-based Multi-Processor System-on-Chip (MPSoC), two types of deadlocks may occur: the routing-dependent deadlocks and the message-dependent deadlocks. The former type of deadlocks can be avoided by removing any cyclic paths on the application's channel dependency graph. The message dependent deadlocks, caused by...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    A Novel Batch-Based Group Key Management Protocol Applied to the Internet of Things

    Many applications for ad hoc networks are based on a point-to-multipoint (multicast) communication paradigm, where a single source sends common data to many receivers, or, inversely, on a multipoint-to-point communication paradigm, where multiple sources send data to a single receiver. In such scenarios, communication can be secured by adopting a...

    Provided By Reed Business Information

  • White Papers // May 2013

    ARTE: An Application-Specific Run-Time ManagEment Framework for Multi-Cores Based on Queuing Models

    In this paper, the authors present an Application-specific Run-Time managEment (ARTE) framework to tackle the problem of managing computational resources in an application specific multi-core system. The ARTE framework run-time goal is to minimize applications' response times while meeting the applications' computational demands and fitting within the available power budget....

    Provided By Reed Business Information

  • White Papers // May 2013

    Two-Level Caches Tuning Technique for Energy Consumption in Reconfigurable Embedded MPSoC

    In order to meet the ever-increasing computing requirement in the embedded market, multiprocessor chips were proposed as the best way out. In this paper, the authors investigate the energy consumption in these embedded MPSoC systems. One of the efficient solutions to reduce the energy consumption is to reconfigure the cache...

    Provided By Reed Business Information

  • White Papers // May 2013

    Optimizing Two-Dimensional DMA Transfers for Scratchpad Based MPSoCs Platforms

    Reducing the effects of off-chip memory access latency is a key factor in exploiting efficiently embedded multi-core platforms. The authors consider architectures that admit a multi-core computation fabric, having its own fast and small memory to which the data blocks to be processed are fetched from external memory using a...

    Provided By Reed Business Information

  • White Papers // May 2013

    DocCloud: A Document Recommender System on Cloud Computing With Plausible Deniability

    Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. Little work has been done regarding secure recommender systems or how to cope with the legal...

    Provided By Reed Business Information

  • White Papers // May 2013

    Cloud Monitoring: A Survey

    Now-a-days, cloud computing is widely used to deliver services over the Internet for both technical and economical reasons. The number of cloud-based services has increased rapidly and strongly in the last years, and so is increased the complexity of the infrastructures behind these services. To properly operate and manage such...

    Provided By Reed Business Information

  • White Papers // Apr 2013

    Reducing Cache and TLB Power by Exploiting Memory Region and Privilege Level Semantics

    In the past decade, the general-purpose microprocessor industry has gone through a shift from performance-first to energy-efficient computing. Computer architects invented and investigated methods to optimize power consumption of literally every component of the processor. In contrast with most other units of the chip, the first-level cache in commercial general-purpose...

    Provided By Reed Business Information

  • White Papers // Apr 2013

    An Approximate Approach for Area Coverage in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), coverage is a critical issue that has a major bearing on the quality of sensing over the target region. In this paper, the authors study the coverage of a region P with a transparent boundary and transparent obstacles. A transparent obstacle is an area in...

    Provided By Reed Business Information

  • White Papers // Mar 2013

    Model-Driven Provisioning of Application Services in Hybrid Computing Environments

    Hybrid computing environment is making rapid progress in acceptance by SMEs, government agencies, universities and scientists. Such computing environment cannot only reduce management costs, but is pivotal to enabling next generation of applications on unprecedented scales. Research and development efforts in hybrid computing environments are still at infancy. More tangible...

    Provided By Reed Business Information

  • White Papers // Mar 2012

    Network Pruning for Energy Saving in the Internet

    Many scientific works propose methods of reducing the amount of energy consumed by the Internet. Although the structure of the Internet was not developed with specific attention to energy consumption, there are various components on which it is possible to act. In the authors' work, they analyze the possibility of...

    Provided By Reed Business Information

  • White Papers // Nov 2011

    Cross-Layer Network Formation for Energy-Efficient IEEE 802.15.4/ZigBee Wireless Sensor Networks

    In IEEE 802.15.4/ZigBee Wireless Sensor Networks (WSNs) a specific node (called the PAN coordinator or sink) controls the whole network. When the network operates in a multi-hop fashion, the position of the PAN coordinator has a significant impact on the performance: it strongly affects network energy consumption for both topology...

    Provided By Reed Business Information

  • White Papers // Aug 2009

    Performance Analysis of IEEE 802.15.4 Wireless Sensor Networks: An Insight Into the Topology Formation Process

    Topology formation is an important issue in a wireless sensor network. Performance parameters such as energy consumption, network lifetime, data delivery delay, sensor field coverage depend on the network topology. In this paper, the authors analyze the process of formation of a wireless sensor network according to the IEEE 802.15.4/ZigBee...

    Provided By Reed Business Information

  • White Papers // Feb 2011

    Dynamic Cooperator Selection in Cognitive Radio Networks

    The primary objective of cooperation in Cognitive Radio (CR) networks is to increase the spectrum access efficiency and improve the network performance. However, Byzantine adversaries or unintentional erroneous conduct in cooperation can lead to destructive behavior of CR users that can decrease their own and others' performances. This paper presents...

    Provided By Reed Business Information

  • White Papers // Jan 2012

    Interference Effects on Modulation Techniques in Diffusion Based Nanonetworks

    Currently, Communication via Diffusion (CvD) is one of the most prominent systems in nano-networks. In this paper, the authors evaluate the effects of two major interference sources, Inter-Symbol Interference (ISI) and Co-channel Interference (CCI) in the CvD system using different modulation techniques. In the analysis of this paper, they use...

    Provided By Reed Business Information

  • White Papers // Jan 2012

    PHLAME: A Physical Layer Aware MAC Protocol for Electromagnetic Nanonetworks in the Terahertz Band

    Nano-networks will enable advanced applications of nanotechnology in the biomedical, industrial, environmental and military fields, by allowing integrated nano-devices to communicate and to share information. Due to the expectedly very high density of nano-devices in nano-networks, novel Medium Access Control (MAC) protocols are needed to regulate the access to the...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    Channel Model and Analysis for Wireless Underground Sensor Networks in Soil Medium

    Wireless Underground Sensor Networks (WUSNs) constitute one of the promising application areas of the recently developed wireless sensor networking techniques. The main difference between WUSNs and the terrestrial wireless sensor networks is the communication medium. The propagation characteristics of ElectroMagnetic (EM) waves in soil and the significant differences between propagation...

    Provided By Reed Business Information

  • White Papers // Feb 2009

    Operating Point Selection for Primary and Secondary Users in Cognitive Radio Networks

    This paper addresses the problem of opportunistic access of secondary users to licensed spectrum in cognitive radio networks. In order to avoid interference to the licensed primary users, efficient spectrum detection methods need to be developed. For this purpose, in recent years several sensing techniques have been proposed to monitor...

    Provided By Reed Business Information

  • White Papers // Jun 2011

    The Robust Joint Solution for Channel Assignment and Routing for Wireless Mesh Networks With Time Partitioning

    Wireless Mesh Networks (WMNs) have proven to be a versatile solution to last-mile Internet service as well as dense urban coverage. The key benefits are the low cost and the ease of deployment due to their extensibility and flexibility. A WMN consists of wireless routers and Access Points (APs) forming...

    Provided By Reed Business Information

  • White Papers // May 2012

    NCSWT: An Integrated Modeling and Simulation Tool for Networked Control Systems

    Networked Control Systems (NCS) are becoming increasingly ubiquitous in a growing number of applications, such as groups of unmanned aerial vehicles and industrial control systems. The evaluation of NCS properties such as stability and performance is very important given that these systems are typically deployed in critical settings. This paper...

    Provided By Reed Business Information

  • White Papers // May 2011

    Quantifying the Correctness, Computational Complexity, and Security of Privacy-Preserving String Comparators for Record Linkage

    Record linkage is the task of identifying records from disparate data sources that refer to the same entity. It is an integral component of data processing in distributed settings, where the integration of information from multiple sources can prevent duplication and enrich overall data quality, thus enabling more detailed and...

    Provided By Reed Business Information

  • White Papers // Feb 2010

    How Secure Is the Next Generation of IP-Based Emergency Services Architecture?

    For some location based applications, such as emergency calling or roadside assistance, it appears that the identity of the requester is less important than accurate and trustworthy location information for accomplishing the main function. Accurate and genuine location is important for these applications to avoid misuse. In this paper, the...

    Provided By Reed Business Information

  • White Papers // Jun 2012

    A Robust Optimisation Model and Cutting Planes for the Planning of Energy-Efficient Wireless Networks

    In this paper, the authors present an optimization model for the energy-efficient planning of future wireless networks. By applying robust optimisation, they extend this model to a robust formulation which considers demand uncertainties. The computability of the resulting model is moderate. Hence, they apply three different cutting plane approaches for...

    Provided By Reed Business Information

  • White Papers // Jan 2009

    A High Level Power Model for Network-on-Chip (NoC) Router

    This paper presents a high level power estimation methodology for a Network-on-Chip (NoC) router, that is capable of providing cycle accurate power profile to enable power exploration at system level. The authors' power macro model is based on the number of flits passing through a router as the unit of...

    Provided By Reed Business Information

  • White Papers // May 2012

    Physical-Layer Network Coding: Tutorial, Survey, and Beyond

    The concept of Physical-layer Network Coding (PNC) was proposed in 2006 for application in wireless networks. Since then it has developed into a subfield of network coding with wide implications. The basic idea of PNC is to exploit the mixing of signals that occurs naturally when ElectroMagnetic (EM) waves are...

    Provided By Reed Business Information

  • White Papers // Jun 2009

    Adaptive Routing in Wormhole-Switched Necklace-Cubes: Analytical Modelling and Performance Comparison

    The necklace hypercube has recently been introduced as an attractive alternative to the well-known hypercube. Previous research on this network topology has mainly focused on topological properties, VLSI and algorithmic aspects of this network. Several analytical models have been proposed in the literature for different interconnection networks, as the most...

    Provided By Reed Business Information

  • White Papers // Nov 2009

    Common Control Channel Design for Cognitive Radio Wireless Ad Hoc Networks Using Adaptive Frequency Hopping

    Cognitive Radio (CR) technology enables the opportunistic use of the portions of the licensed spectrum by the CR users, while ensuring low interference to the Primary User (PU) activity in the licensed bands. The spectrum is sensed locally by the CR users, and a specific channel that is acceptable to...

    Provided By Reed Business Information

  • White Papers // Jan 2011

    Maximizing Lifetime of Event-Unobservable Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs) contextual information such as the information regarding whether, when, and where the data is collected cannot be protected using only traditional measures (e.g., encryption). Contextual information can be protected against global eavesdroppers by periodic packet transmission combined with dummy traffic filtering at proxy nodes. In...

    Provided By Reed Business Information

  • White Papers // Dec 2009

    Prolonging Network Lifetime With Multi-Domain Cooperation Strategies in Wireless Sensor Networks

    In wireless sensor networks nodes forward the data they acquire from the environment towards the base station by relaying through multiple intermediate sensor nodes used as relays. If multiple sensor networks are deployed in close proximity then they can help each others' data forwarding so that all parties involved in...

    Provided By Reed Business Information

  • White Papers // Apr 2012

    Interference Mitigation for Cognitive Radio MIMO Systems Based on Practical Precoding

    In this paper, the authors propose two subspace-projection-based precoding schemes, namely, Full-Projection (FP)- and Partial-Projection (PP)-based precoding, for a Cognitive Radio Multiple-Input Multiple-Output (CR-MIMO) network to mitigate its interference to a primary Time-Division-Duplexing (TDD) system. The proposed precoding schemes are capable of estimating interference channels between CR and primary networks,...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    Data Obfuscation With Network Coding

    Network coding techniques such as fountain codes are a promising way to disseminate large bulks of data in a multicast manner over an unreliable medium. In this paper, the authors investigate how to conceal such an encoded data stream on its way to numerous receivers with a minimum investment. Compared...

    Provided By Reed Business Information

  • White Papers // Oct 2010

    Analytical Modeling of TCP Flow in Wireless LANs

    TCP (Transmission Control Protocol) is one of the protocols which are widely used in Internet environments. This paper presents an analytical model developed using the Stochastic Reward Net (SRN) modeling technique for the TCP flow behavior in WLANs. The purpose of developing an analytical model is the evaluation of stationary...

    Provided By Reed Business Information

  • White Papers // Aug 2010

    A Fluid Queue Modulated by Two Independent Birth - Death Processes

    The authors present a fluid queue model driven by two independent finite state birth - death processes with the objective to study the buffer occupancy distribution in any intermediate node in a communication network. In a communication network, at any node, the arrival and service of the packets are with...

    Provided By Reed Business Information

  • White Papers // Sep 2011

    An Efficient IP Address Lookup Algorithm Based on a Small Balanced Tree Using Entry Reduction

    Due to a tremendous increase in internet traffic, backbone routers must have the capability to forward massive incoming packets at several gigabits per second. IP address lookup is one of the most challenging tasks for high-speed packet forwarding. Some high-end routers have been implemented with hardware parallelism using Ternary Content...

    Provided By Reed Business Information

  • White Papers // Sep 2009

    Analysis of Network Processing Workloads

    Network processing is becoming an increasingly important paradigm as the Internet moves towards an architecture with more complex functionality in the data path. Modern routers not only forward packets, but also process headers and payloads to implement a variety of functions related to security, performance, and customization. It is important...

    Provided By Reed Business Information

  • White Papers // Dec 2008

    Transparent TCP Acceleration

    Transparent Transmission Control Protocol (TCP) acceleration is a technique to increase TCP throughput without requiring any changes in end-system TCP implementations. By intercepting and relaying TCP connections inside the network, long end-to-end feedback control loops can be broken into several smaller control loops. This decrease in feedback delay allows accelerated...

    Provided By Reed Business Information

  • White Papers // Apr 2010

    A Content-Guided Publish/subscribe Mechanism for Sensor Networks Without Location Information

    The publish/subscribe paradigm represents a large class of applications in sensor networks as sensors are designed mainly to detect and notify upon events of interests. Thus, it is important to design a publish/subscribe mechanism to enable such applications. Many existing solutions require that the sensor node locations be known, which...

    Provided By Reed Business Information

  • White Papers // Feb 2012

    Fine Grained Load Balancing in Multi-Hop Wireless Networks

    In this paper, the authors address the problem of local balancing in multi-hop wireless networks. They introduce the notion of proactive routing: after a short pre-processing phase in which nodes build their routing tables by exchanging messages with neighbors, they require that nodes decide the relay of each message without...

    Provided By Reed Business Information

  • White Papers // Jun 2012

    Generating Trusted Graphs for Trust Evaluation in Online Social Networks

    The authors propose a novel trust framework to address the issue of ''Can Alice trust Bob on a service?'' in large Online Social Networks (OSNs). Many models have been proposed for constructing and calculating trust. However, two common shortcomings make them less practical, especially in large OSNs: the information used...

    Provided By Reed Business Information

  • White Papers // Mar 2012

    Depth-Color Based 3D Image Transmission Over Wireless Networks With QoE Provisions

    The deployment of 3-D image techniques is one of the most promising fields among the development of new applications for natural image scenes. Driven by urgent demands from industry and users, 3-D image technology has received significant research attention in recent years. 3D image streaming gives users an extra dimension...

    Provided By Reed Business Information

  • White Papers // Jun 2011

    Playdoh: A Lightweight Python Library for Distributed Computing and Optimisation

    Parallel computing is now an essential paradigm for high-performance scientific computing. Most existing hardware and software solutions are expensive or difficult to use. The authors developed Playdoh, a Python library for distributing computations across the free computing units available in a small network of multi-core computers. Playdoh supports independent and...

    Provided By Reed Business Information

  • White Papers // Jul 2012

    Multicast with Cooperative Gateways in Multi-Channel Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are emerging as a promising solution for pervasive and cost-effective broadband connections. In this paper, the authors target high-throughput multicast that combats the interference and bandwidth limitation of wireless channels, which are particularly severe with wireless meshes. They suggest that they can be addressed by introducing...

    Provided By Reed Business Information

  • White Papers // Dec 2011

    Adaptive Service Provisioning for Enhanced Energy Efficiency and Flexibility in Wireless Sensor Networks

    Energy constraints and high connectivity dynamics render Wireless Sensor Networks (WSNs) difficult to program and use. Software applications must be coordinated not only functionally, as is traditionally done, but also in terms of resource utilization and adaptation to a dynamic environment. This paper presents Adaptive Servilla, a middleware that provides...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    Servilla: A Flexible Service Provisioning Middleware for Heterogeneous Sensor Networks

    Device heterogeneity in wireless sensor networks is rendering such networks increasingly difficult to program. To address this problem, the authors present Servilla, a novel middleware that enables applications to be both platform-independent and efficient despite executing over a diverse and dynamic set of devices. It achieves this by using service-oriented...

    Provided By Reed Business Information

  • White Papers // May 2012

    Cooperative Detection of Primary User Emulation Attacks in CRNs

    Cognitive Radio Networks (CRNs) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. With such purpose, coexistence mechanisms among CRN nodes or secondary users and legitimate users of the spectrum or primary users are defined. However, due to the particular features of...

    Provided By Reed Business Information

  • White Papers // May 2008

    Particularistic and System Trust Among Small and Medium Enterprises: A Comparative Study in China's Transition Economy

    Guanxi, a type of particularistic trust observed in Confucian societies has mostly been viewed as a static phenomenon. It is not clear how the role of guanxi changes over time during institutional transitions. This field study of twenty one Small and Medium Enterprises (SMEs) located in two large cities in...

    Provided By Reed Business Information

  • White Papers // Jun 2011

    Challenges Faced by the Small and Medium Enterprises (SMEs) in Malaysia: An Intellectual Capital Perspective

    In a knowledge based economy the role of small and medium enterprises is very critical for the economic development. The main thrust of this study was on the competiveness of the SMEs in a knowledge-based economy. In addition, this paper also explores the challenges which are facing the Small and...

    Provided By Reed Business Information

  • White Papers // Oct 2009

    Collaborative Networked Organizations: Status and Trends in Manufacturing

    Collaborative networked organizations represent an important paradigm to help manufacturing companies cope with the challenges of market turbulence. Through collaboration, assisted by ICT, companies extend their ''Reach ability space'' and participate in agile value creation networks. After a brief summary of the main concepts and collaborative forms, this paper presents...

    Provided By Reed Business Information

  • White Papers // Jan 2009

    An Integrated Decision Support System Dealing With Qualitative and Quantitative Objectives for Enterprise Software Selection

    Previous methods for enterprise software selection generally take into account the attributes that are restricted to some financial factors, such as costs and benefits. However, the literature lacks studies on considering the evaluation of both functional and non-functional suitability of software alternatives versus various requirements. This study presents a new...

    Provided By Reed Business Information

  • White Papers // Feb 2011

    Evaluation Systems and Methods of Enterprise Informatization and Its Application

    An efficient evaluation index system and evaluation method for enterprise informatization is critically important for guiding the implementation and development tasks of enterprise information systems. This paper, based on pre-research for a group of typical enterprises and item, factor and reliability analysis of acquired samples, presents a comprehensive evaluation index...

    Provided By Reed Business Information