RWSoftware

Displaying 1-40 of 284 results

  • White Papers // Nov 2014

    Ontology-Driven and Community-Based Framework for Services Description and Selection of Composite Services

    In this paper, the authors propose OWL DL ontology for web service description which aims at automating selection of composite web services. In this ontology, they identify communities as a mean to organize web services for a given shared domain. They relate concepts of community, service's functionality (atomic abstract service...

    Provided By RWSoftware

  • White Papers // Nov 2014

    Specifing and Verifing Aspect-Oriented Systems in Rewriting Logic

    Aspect-Oriented (AO) systems have to deal with an important problem which is the management of aspect interaction. In this paper, the authors introduce a first tool, known as AO-Maude, which is based on Maude language for the specification and the verification of the AO systems. The proposed tool relies on...

    Provided By RWSoftware

  • White Papers // Nov 2014

    A Multi-Objective Hybrid Particle Swarm Optimization-Based Service Identification

    Service identification step is a basic requirement for a detailed design and implementation of services in a Service Oriented Architecture (SOA). Existing methods for service identification ignore the automation capability while providing human based prescriptive guidelines, which mostly are not applicable at enterprise scales. In this paper, the authors propose...

    Provided By RWSoftware

  • White Papers // Nov 2014

    Formal Specification of Multi-Agent System Architecture

    Multi-Agent Systems (MAS) are an emerging paradigm that has high potentials for developing distributed, open and concurrent complex systems. These systems often need to operate in dynamic environments and face the challenges of handling continuously changing requirements. These aspects increase the complexity of designing MAS. To handle the complexity and...

    Provided By RWSoftware

  • White Papers // Nov 2014

    K-Maude Definition of Dynamic Software Architecture

    One of the complex issues in developing architectural models of software systems is the capturing of architectures dynamics, i.e., systems for which composition of interacting components, changes at run time. In this paper, the authors argue that it is possible and valuable to provide a Dynamic Software Architecture Meta-model (DySAM)...

    Provided By RWSoftware

  • White Papers // Nov 2014

    Component-Based Specification of Software Product Line Architecture

    Software product lines have known an increasing use over the last years, taking advantage from the important benefits they may bring to software development in terms of time, cost and effort. However, product line approaches remain immature owing to the fact that they still base on traditional design concepts of...

    Provided By RWSoftware

  • White Papers // Nov 2014

    Dealing with Deviations on Software Process Enactment : Comparison Framework

    Software development is a collective and complex task carried out through the cooperation of human agents and automated tools, this interaction defines the software process. PSEE (Process-centered Software Engineering Environment) are environments designed to support the creation and exploitation of software process models that define the expected behaviors of process...

    Provided By RWSoftware

  • White Papers // Nov 2014

    Modeling Channel Allocation via BRS: Case of WMNs

    Wireless Mesh Networks (WMNs), is an emerging wireless technology which attracts more and more attention of service providers and enterprises. The main advantage of this new class of network is to offer a flexible and economical way to expand internet access. Their major concern is to improve the flow and...

    Provided By RWSoftware

  • White Papers // Nov 2014

    Generating FoCaLiZe Specifications from UML Models

    UML is the defacto standard language to graphically describe systems in an object oriented way. Once an application has been modeled, Model Driven Architecture (MDA) techniques can be applied to generate code from such models. Because UML lacks formal basis to analyze and check model consistency, it is pertinent to...

    Provided By RWSoftware

  • White Papers // Nov 2014

    BiCloud-2M: A Combined Bigraph Maude-based Tool for Cloud Specification and Analysis

    Service availability is a challenging issue in cloud computing. It implies continuous reconfiguration of cloud architecture by adding or removing different resources (virtual machines and services) to ensure the suited quality of service. Thus a main goal in cloud systems design is to model and analyze cloud architecture and its...

    Provided By RWSoftware

  • White Papers // Nov 2014

    A Highly Adaptive Leader Election Algorithm for Mobile Ad Hoc Networks

    Leader election has been identified as a basic building block in distributed computing. MANETs are distinct from traditional distributed systems as they are dynamic and self-organizing networks because of their dynamic wireless link formation and removal, network partitioning and disconnections, limited bandwidth and energy and highly variable message delay. These...

    Provided By RWSoftware

  • White Papers // Nov 2014

    Software Component Quality Evaluation

    Component-Based Software Engineering (CBSE) provides for developers the ability to easily reuse and assemble software entities to build complex software. It is based on the composition of prefabricated software entities called components. In this paper, the selection step is very important. It consists of searching and selecting appropriate software components...

    Provided By RWSoftware

  • White Papers // Nov 2014

    A New Distributed Anonymization Protocol to Satisfy Multiple Data Provider's Privacy Requirements

    Privacy and security concerns are among the main obstacles facing the widespread adoption of this new technology. Data anonymization makes data worthless to anyone except the owner of the data. It is one of the methods for transforming the data in such a way that it prevents identification of key...

    Provided By RWSoftware

  • White Papers // Nov 2014

    The Wi-STARK Architecture for Resilient Real-Time Wireless Communications

    Networking communications play an important role to secure a dependable and timely operation of distributed and real-time embedded system applications; however, an effective real-time support is not yet properly addressed in the wireless realm. This paper presents Wi-STARK, a novel architecture for resilient and real-time wireless communications within a one-hop...

    Provided By RWSoftware

  • White Papers // Nov 2014

    Constant Bandwidth Server Revisited

    The Constant Bandwidth Server (CBS) is an algorithm for providing temporal protection and real-time guarantees to real-time sporadic tasks. Recently, an implementation of this algorithm called SCHED-DEADLINE has been included in the Linux kernel. Therefore, the CBS algorithm is now used to serve more generic tasks than do not obey...

    Provided By RWSoftware

  • White Papers // Nov 2014

    Validation of a Security Metamodel for Development of Cloud Applications

    Development of secure cloud applications requires a supportive approach that should also enable software assessment and certification by different mechanisms. These can assure by independent means that the required security is present. In this paper, the authors present a Core Security Meta-model (CSM) that is the director of a security...

    Provided By RWSoftware

  • White Papers // Nov 2014

    On Metamodel Superstructures Employing UML Generalization Features

    The authors employ UML generalization features in order to describe multi-level meta-models and their connections. The basic idea is to represent several meta-model levels in one UML and OCL model and to connect the meta-models with (what they call) a superstructure. The advantage of having various levels in one model...

    Provided By RWSoftware

  • White Papers // Oct 2014

    Software Analytics for MDE Communities

    The MDE research community has grown significantly in size and maturity in the last decade. During these years, a plethora of languages and tools has been proposed to address different challenges of the MDE approach to software development. As the community continues to broaden its expertise, it is worthwhile to...

    Provided By RWSoftware

  • White Papers // Oct 2014

    Energy Efficiency Embedded Service Lifecycle: Towards an Energy Efficient Cloud Computing Architecture

    Cloud computing aims to streamline the on-demand provisioning of software, hardware, and data to provide flexibility and agility, and economies of scale in IT resource management. The paper argues the need to provide novel methods and tools to support software developers aiming to optimize energy efficiency and minimize the carbon...

    Provided By RWSoftware

  • White Papers // Oct 2014

    Privacy-Preserving Indoor Localization

    Upcoming Wi-Fi-based localization systems for indoor environments face a conflict of privacy interests: server-side localization violates location privacy of the users, while localization on the user's device forces the localization provider to disclose the details of the system, e.g., sophisticated classification models. The authors show how secure two-party computation can...

    Provided By RWSoftware

  • White Papers // Oct 2014

    Eco-Reports in Clouds

    In this paper, the authors discuss the issues arising from the need of presenting to the user information about the environmental impact of their applications in a cloud environment. Several aspects have to be considered: to make aware the users of the energy consumption and environmental impact of their applications,...

    Provided By RWSoftware

  • White Papers // Oct 2014

    Eco-Efficient Cloud Resource Monitoring and Analysis

    In this paper, the authors present an enhanced monitoring approach considering the infrastructure of providers' sites and the Virtual Machines (VMs) hosted on physical nodes. It considers the GAMES and the OPTIMIS projects that were both developing methods for energy-aware resource usage. This paper presents an approach for monitoring cloud...

    Provided By RWSoftware

  • White Papers // Oct 2014

    Integrating Run-Time Observations and Design Component Models for Cloud System Analysis

    Run-time models have been proven beneficial in the past for predicting upcoming quality flaws in cloud applications. Observation approaches relate measurements to executed code whereas prediction models oriented towards design components are commonly applied to reflect reconfigurations in the cloud. Levels of abstraction differ between code observations and these prediction...

    Provided By RWSoftware

  • White Papers // Oct 2014

    On Developing Open Source MDE Tools: Our Eclipse Stories and Lessons Learned

    Tool development has always been a fundamental activity of software engineering. Now-a-days, open source is changing the way this is done in many organizations. Traditional ways of doing things are progressively enhanced or even sometimes replaced by new organizational schemes, benefiting as much as possible from the properties of Open...

    Provided By RWSoftware

  • White Papers // Oct 2014

    On Static and Dynamic Analysis of UML and OCL Transformation Models

    This contribution discusses model transformations in the form of transformation models that connect a source and a target meta-model. The transformation model is statically analyzed within a UML and OCL tool by giving each constraint an individual representation in the underlying class diagram by highlighting the employed model elements. The...

    Provided By RWSoftware

  • White Papers // Oct 2014

    HybridRank : A Hybrid Content-Based Approach to Mobile Game Recommendations

    The massive number of mobile games available necessitates a technique to help the consumer find the right game at the right time. This paper introduces HybridRank, a novel hybrid algorithm to deliver recommendations for mobile games. This technique is based on a personalized random walk approach, with the incorporation of...

    Provided By RWSoftware

  • White Papers // Oct 2014

    A Hybrid Strategy for Privacy-Preserving Recommendations for Mobile Shopping

    To calculate recommendations, recommender systems collect and store huge amounts of users' personal data such as preferences, interaction behavior, or demographic information. If these data are used for other purposes or get into the wrong hands, the privacy of the users can be compromised. Thus, service providers are confronted with...

    Provided By RWSoftware

  • White Papers // Oct 2014

    Towards Testing Model Transformation Chains Using Precondition Construction in Algebraic Graph Transformation

    Complex model-based tools such as code generators are typically designed as chains of model transformations taking as input a model of a software application and transforming it through several intermediate steps and representations. The complexity of intermediate models is such that testing is more conveniently done on the integrated chain,...

    Provided By RWSoftware

  • White Papers // Sep 2014

    Derivation of a Queuing Network Model for Structured P2P Architectures

    Peer-To-Peer (P2P) networks have using commonly used for tasks such as file sharing or file distribution, and for building distributed applications in large scale network. Their performance measures are generally based on simulation methods software such as NS-2, P2PSim, OpenNet, etc. Hence, the absence of a validation of the simulation...

    Provided By RWSoftware

  • White Papers // Sep 2014

    Applying Data Fragmentation in IEEE 802.15.4: Modeling and Analysis Under Unsaturated Traffic

    The IEEE 802.15.4 standard, which is developed for low rate applications, offers low latency and energy consumption for wireless sensor networks. The use of the standardized slotted Carrier Sense Multiple Access (CSMA/CA), as a channel access mechanism, can, however, lead to wastage of the bandwidth utilization and an additional transmission...

    Provided By RWSoftware

  • White Papers // Sep 2014

    Mapping OCL Constraints Into CTL-Like Logic and SML for UML Validation

    The UML (Unified Modeling Language) graphical models miss providing some pertinent elements of specification as constraints over objects and operations. To fill this lack, OCL (Object Constraint Language) has been developed by IBM and integrated to UML as a modern and formal modeling language, which is easy to learn and...

    Provided By RWSoftware

  • White Papers // Sep 2014

    Cross-Layer Energy-Aware Protocol for Wireless Sensor Networks

    The resource limited nature of WSNs requires that protocols implemented on these networks be energy-efficient, scalable and distributed. In this paper, the authors present a novel combined routing and MAC protocol. The protocol achieves energy efficiency by minimizing signaling overhead through stateless routing decisions that are made at the receiver...

    Provided By RWSoftware

  • White Papers // Sep 2014

    Comparison of Routing Protocols in Wireless Sensor Networks

    Several routing protocols have been proposed to maximize the sensor networks lifetime. However, most of these solutions try to find an energy efficient path and don't account for energy consumption balancing in sensor network. This usually leads to network partitioning. The aim of this paper is to evaluate, analyze and...

    Provided By RWSoftware

  • White Papers // Sep 2014

    Fairness Improvement of MAC in Wireless Ad Hoc Networks

    There are many Medium Access Control (MAC) protocols proposed to achieve fairness in presence of hidden and/or exposed nodes. In a general approach to address the problem of fairness is proposed. This approach defines a fairness index and the goal is to minimize this fairness index to achieve fairness. In...

    Provided By RWSoftware

  • White Papers // Sep 2014

    Model-Checking Cloud Systems Using BigMC

    Cloud computing is a promising concept in the IT evolution that has increasingly attracted attention from both industry and academic sectors. However, it has introduced new security problems and obstacles. Since formal methods provide a reliable mathematical basis giving rise to safely analyzable and easily verifiable models, this paper, the...

    Provided By RWSoftware

  • White Papers // Sep 2014

    Coping with Spoofed PS-Poll Based DoS Attack in IEEE 802.11 Networks

    IEEE 802.11 networks are particularly vulnerable to DoS (Denial of Service) attacks targeting the network availability. In this paper, the authors focus on the PS-Poll based DoS attack, where the attacker spoofs the polling frame on behalf of the client in order to discard the client's buffered packets at the...

    Provided By RWSoftware

  • White Papers // Sep 2014

    Analytical Modeling of the IEEE 802.11e EDCA Network with Contention Free Burst

    Contention Free Burst (CFB) is a promising burst transmission scheme defined in the IEEE 802.11e Medium Access Control (MAC) protocol to achieve differentiated Quality of Service (QoS) and improve the utilization of the wireless scarce bandwidth. Although modeling and performance analysis of the IEEE 802.11e network have attracted tremendous research...

    Provided By RWSoftware

  • White Papers // Sep 2014

    Graph Clustering Evaluation Metrics as Software Metrics

    Graph Clustering Evaluation (GCE) metrics quantify the quality of clusters obtained by graph clustering (community detection) algorithms. In this paper, the authors argue that GCE metrics can be applied on graph representations of software systems in order to evaluate the degree of cohesiveness of software entities. In contrast to widely...

    Provided By RWSoftware

  • White Papers // Sep 2014

    Feature Models at Run Time: Feature Middleware for Multi-Tenant SaaS Applications

    Software Product Line Engineering (SPLE) techniques revolve around a central variability model which in many cases is a feature model that documents the logical capabilities of the system as features and the variability relationships between them. In more traditional SPLE, this feature model is a result of domain analysis and...

    Provided By RWSoftware

  • White Papers // Sep 2014

    Approaches for Test Case Generation From UML Diagrams

    Model Based Testing (MBT) is an important approach with many advantages that can reduce the cost and increase the effectiveness and quality of a testing procedure. In MBT, test cases can be derived from different models, also from the popularly used UML diagrams. Different UML diagrams include various important pieces...

    Provided By RWSoftware

  • White Papers // May 2014

    Eclipse SoaML: A Tool for Engineering Service Oriented Applications

    Service-oriented applications focus on the definition of self-contained independent pieces of software called services providing specific functionality, being now-a-days one of the most used implementations to support business process execution. Although languages, technologies and platforms supporting the service-oriented paradigm have evolved within the last decades, it is not the case...

    Provided By RWSoftware

  • White Papers // May 2014

    SOVA - A Tool for Semantic and Ontological Variability Analysis

    Variability analysis in Software Product Line Engineering (SPLE) utilizes various software-related artifacts, including requirements specifications. Currently, measuring the similarity of requirements specifications for analyzing variability of software products mainly takes into account semantic considerations. This might lead to failure to capture important aspects of the software behavior as perceived by...

    Provided By RWSoftware

  • White Papers // Jun 2014

    Demonstration of the Online Method Engine

    During the past decade, much research has been performed in the areas of method engineering and process improvement. As a result of this paper, the authors are developing the Online Method Engine (OME). The OME is a knowledge management system that provides support during process improvement initiatives, using a set...

    Provided By RWSoftware

  • White Papers // May 2014

    UPROM Tool: A Unified Business Process Modeling Tool for Generating Software Life Cycle Artifacts

    UPROM tool is a business process modeling tool designed to conduct business process and requirements analysis in a unified way to constitute a basis for process automation. Enabling the application of UPROM methodology, the tool provides editors for six different diagram types based on a common meta-model. It ensures conformance...

    Provided By RWSoftware

  • White Papers // May 2014

    OF-PENDA: A Software Tool for Fault Diagnosis of Discrete Event Systems Modeled by Labeled Petri Nets

    In this paper, a software tool to deal with diagnosis of Discrete Event Systems (DESs) is presented. This tool called On-the-Fly PEtri-Net-based Diagnosability Analyzer (OF-PENDA) implements the techniques developed in [13] for the diagnosis of DESs modeled by Labeled Petri Nets (LPNs). This technique aims to cope with the state...

    Provided By RWSoftware

  • White Papers // May 2014

    A Timestamping Scheme with Eternal Security in the Bounded Storage Model

    Digital time stamping is a cryptographic technique allowing affixing a reliable date to a digital document. The security of most existing time stamping systems is based on the security of the used cryptographic techniques as hash functions. However, a hash function has a limited lifetime. In this paper, the authors...

    Provided By RWSoftware

  • White Papers // Jun 2014

    Formal Enforcement of Security Policies on Choreographed Services

    Web services are software systems that support distributed applications composed of independent processes which communicate by message passing. To realize the full potential of web services, the authors need to compose existent web services in order to get more functionality. However the composition of web services should be secure. In...

    Provided By RWSoftware

  • White Papers // Jun 2014

    Extraction of Insider Attack Scenarios From a Formal Information System Modeling

    The early detection of potential threats during the modeling phase of a Secure Information System is required because it favors the design of a robust access control policy and the prevention of malicious behaviors during the system execution. This paper deals with internal attacks which can be made by people...

    Provided By RWSoftware

  • White Papers // May 2014

    A Principle-Based Goal-Oriented Requirements Language (GRL) for Enterprise Architecture

    Business processes, goals, and tasks of individuals in an Enterprise must constantly be aligned with several regulations, standards, policies and EA principles imposed internally by organizations or externally by governments. Due to the complexity of these documents and their constant changes, it is not possible for organizations and individuals to...

    Provided By RWSoftware

  • White Papers // May 2014

    Modeling and Applying Security Patterns Using Contextual Goal Models

    Security patterns have been proposed to help analysts with little security knowledge to tackle repetitive security design tasks. Although advanced research in this field has produced an impressive collection of patterns, they are not well integrated with security requirements analysis and not easy to apply. Goal-oriented modeling languages have been...

    Provided By RWSoftware

  • White Papers // May 2014

    On the Classification of Cyberphysical Smart Objects in the Internet of Things

    The vision of the Internet of Things (IoT) based on Smart Objects (SOs) promotes a high-level architectural organization of the future IoT designed around the basic concept of SO. A SO is an autonomous, cyber-physical object augmented with sensing/actuation, processing, storing, and networking capabilities. An important issue in sup-porting future...

    Provided By RWSoftware

  • White Papers // May 2014

    An Exploratory Study on the Outcomes of Influence Strategies in Mobile Application Recommendations

    The rapid growth in the mobile application market presents a significant challenge to find interesting and relevant applications for users. Recommendation systems deal with ends such as movies and consumer goods that are consumed by users where similarity between consumer tastes is generally taken into account. On the other hand,...

    Provided By RWSoftware

  • White Papers // May 2014

    Cyber-Physical Software Systems for Smart Worlds: A Case Study of Intelligent Transportation System

    In this paper, the authors discusses the design of cyber-physical systems software around Intelligent Physical Worlds (IPW). An IPW is the embodiment of control software functions wrapped around the external world processes. The IPW performs core domain-specific activities while adapting its behavior to the changing environment conditions and user inputs....

    Provided By RWSoftware

  • White Papers // Apr 2014

    ANIMO, Framework to Simplify the Real-Time Distributed Communication

    In this paper, the authors present a communication framework developed for inter-connecting multi-systems based on the Data Distribution Service (DDS). The new built framework, called ANIMO, facilitates the integration of DDS in an application and the interoperability between the different data types of the Co-operating Objects (COs) with the great...

    Provided By RWSoftware

  • White Papers // Apr 2014

    Distributed Agent-Based Dynamic State Estimation Over a Lossy Network

    In this paper, a novel distributed agent-based dynamical sys-tem estimation strategy is proposed. Each agent has a local observation space and is interested in a specific set of system state elements. The agents have the ability of two-way communication with its neighbors (i.e., agents who share at least one state...

    Provided By RWSoftware

  • White Papers // Mar 2014

    Requirements Engineering for ADDICTion-Aware Software (E-ADDICT)

    Digital Addiction, (hereafter referred to as DA), has become a serious issue that has a diversity of socio-economic side effects. In spite of its high importance, DA has received little recognition and little guidance as to how software engineering should take it into account. This is in stark contrast to...

    Provided By RWSoftware

  • White Papers // Mar 2014

    Definition and Use of Software Requirement Patterns in Requirements Engineering Activities

    The final quality of software products and services depends on the requirements stated in the Software Requirements Specification (SRS). However, some problems like ambiguity, incompleteness and inconsistency, have been reported in the writing of SRS, especially when natural language is used. Requirements reuse has been proposed as a key asset...

    Provided By RWSoftware

  • White Papers // Mar 2014

    A Model-Driven Method for Gesture-Based Interface Requirements Specification

    Currently there are several software development suites that include tools for user interface design and implementation (mainly by programming source code). Some of the tools are multi-platform and multi-style; that is, al-lowing the specification of devices, e.g. computer, notebook, Smartphone, and user interaction styles, e.g. based on gestures, voice, mouse...

    Provided By RWSoftware

  • White Papers // Mar 2014

    Towards Crowdsourcing for Requirements Engineering

    Crowdsourcing is an emerging, typically online, distributed problem solving and production model where a problem is solved through the involvement of a large number of people. In this paper, the authors investigate the potential of crowdsourcing in aiding Requirements Engineering (RE). Although the whole area is still to be explored...

    Provided By RWSoftware

  • White Papers // Mar 2014

    Estimation of Human Mobility Patterns and Attributes Analyzing Anonymized Mobile Phone CDR: Developing Real-Time Census From Crowds of Greater Dhaka

    Anonymized mobile phone CDR allows the user to capture dynamics of mass population movement where individual trajectories are still traceable. While, outcomes of research analyzing CDR merely show distribution of people or crowds, which are aggregation of mass trajectories without any attributes. To further investigate hidden properties of human mobility...

    Provided By RWSoftware

  • White Papers // Sep 2013

    Using Model-Driven Development Tools for Object-Oriented Modeling Education

    Model-Driven Development (MDD) can help verify the accuracy of models and generate source codes, which allows a programmer to minimize the development time required to evaluate the software so that the user's can focus on the modeling process. Thus, modeling should be taught with MDD because it allows students to...

    Provided By RWSoftware

  • White Papers // Sep 2013

    Multi-faceted Practical Modeling Education for Software Engineering

    It is a challenge to teach modeling to undergraduates. Primarily, the difficulty is of teaching abstract concepts because it is hard for students to digest and appreciate abstractions. This paper is about developing a curriculum in which students can experience how models enable one to: find solutions, verify solutions, and...

    Provided By RWSoftware

  • White Papers // Mar 2014

    Assessing Software Design Skills and Their Relation with Reasoning Skills

    Lecturers see students struggle learning software design. In order to create educational interventions it is needed to know which reasoning skills are related to students' software design performance. The authors introduce an online test for measuring students' software design skills and relate those with abstract reasoning. Two student groups of...

    Provided By RWSoftware

  • White Papers // Mar 2014

    Tool Use in Software Modelling Education

    An important decision that must be taken by anyone designing a course involving (object oriented software) modeling is what tool support, if any, to use. Options include picking an industrial strength modeling tool, using a tool specifically designed for educational use, or eschewing tool use altogether in favor of pencil...

    Provided By RWSoftware

  • White Papers // Feb 2014

    Mobile Sensing Data for Urban Mobility Analysis: A Case Study in Preprocessing

    Pervasiveness of mobile phones and the fact that the phones have sensors make them ideal as personal sensors. Smart phones are equipped with a wide range of motion, location and environment sensors that allow the user to analyze, model and predict mobility in urban areas. Raw sensory data is being...

    Provided By RWSoftware

  • White Papers // Jun 2012

    How a Layered REM Architecture Brings Cognition to Today's Mobile Networks

    In this paper, the authors present a layered Radio Environment Map (REM) architecture along with its applications to the Self-Organizing Network (SON) functionalities of heterogeneous LTE radio-access networks comprising macrocells and femtocells. In this architecture, the functional blocks re-appear with different spatial and temporal granularity at different architectural layers. Although,...

    Provided By RWSoftware

  • White Papers // Jun 2012

    Interference Management in Heterogeneous Wireless Networks Based on Context Information

    Femtocells and WiFi have been considered as viable concepts in cellular networks to increase overall system capacity. Critical functionalities for the successful integration of such technologies in macro-cellular topologies are related to radio resource allocation and interference management techniques that must ensure seamless intra-cell and inter-cell interoperation among macro- and...

    Provided By RWSoftware

  • White Papers // Jul 2012

    Impact of Measurement Configurations on the Accuracy of Propagation Model Estimation With Applications to Dynamic Spectrum Access

    In this paper, the authors investigate the possibility of using measurement-based propagation models in the framework of Dynamic Spectrum Access (DSA), where secondary users can opportunistically access the licensed spectrum of a primary system. In principle this will provide a precise representation of the radio environment since it takes into...

    Provided By RWSoftware

  • White Papers // Jan 2013

    MR-DSJ: Distance-Based Self-Join for Large-Scale Vector Data Analysis with MapReduce

    Data analytics gets faced with huge and tremendously increasing amounts of data for which MapReduce provides a very convenient and effective distributed programming model. Various algorithms already support massive data analysis on computer clusters but, in particular, distance-based similarity self-joins lack efficient solutions for large vector data sets though they...

    Provided By RWSoftware

  • White Papers // Apr 2012

    Intelligibility Assessment of a System for Artifical Bandwidth Extension of Telephone Speech

    For the present study, the extension from the 0.3 - 3.4 kHz range towards higher audio frequencies was considered. The employed ABWE algorithm follows the source-filter model of speech production. Techniques for Artificial BandWidth Extension (ABWE) aim to extend the limited audio bandwidth of current narrowband telephone systems (0.3 -...

    Provided By RWSoftware

  • White Papers // Apr 2013

    The Cloud Needs Cross-Layer Data Handling Annotations

    Now-a-days, an ever-increasing number of service providers take advantage of the cloud computing paradigm in order to efficiently offer services to private users, businesses, and governments. However, while cloud computing allows to transparently scale back-end functionality such as computing and storage, the implied distributed sharing of resources has severe implications...

    Provided By RWSoftware

  • White Papers // Oct 2009

    Multicell Multicast Beamforming with Delayed SNR Feedback

    The authors evaluate the performance of beam-forming in the downlink of a Single Frequency Network (SFN), in which common data is transmitted to all participating users simultaneously. The beam-forming is jointly optimized for all cells in the network and for all users. The algorithm is based on spatio-temporal correlation knowledge...

    Provided By RWSoftware

  • White Papers // Aug 2011

    Rate-Compatible LDPC Codes using Optimized Dummy Bit Insertion

    Much attention has been paid to Low-Density Parity-Check (LDPC) codes since their rediscovery by MacKay. They belong to the most powerful channel coding techniques known today and have a broad range of applications. In wireless communication systems it is desirable to be able to adjust the code rate of the...

    Provided By RWSoftware

  • White Papers // Jun 2010

    Capacity of General Discrete Noiseless Channels

    This paper concerns the capacity of the discrete noiseless channel introduced by Shannon. A sufficient condition is given for the capacity to be well-defined. For a general discrete noiseless channel allowing non-integer valued symbol weights, it is shown that the capacity - if well-defined - can be determined from the...

    Provided By RWSoftware

  • White Papers // Jul 2012

    Reachability of the Capacity in Parallel Quantised Channels

    Based upon profound knowledge about wireless communication systems that was gathered during the past decades, modelling biological systems analogously has become more and more popular. Although the assumptions about the latter are sometimes less reliable than those about technical systems, some models have proven useful in explaining the behaviour of...

    Provided By RWSoftware

  • White Papers // May 2012

    Distributed Compressed Sensing for the MIMO MAC With Correlated Sources

    In this paper, the authors consider the transmission of jointly sparse signals over a MIMO MAC composed of two transmitters and one receiver. Distributed compression is performed at the transmitters using a liner transformation and joint reconstruction at the receiver is enabled using the theory of distributed compressed sensing. The...

    Provided By RWSoftware

  • White Papers // Jun 2012

    Detecting Irregularities in Blog Comment Language Affecting POS Tagging Accuracy

    Studying technology acceptance requires the survey and analysis of user opinions to identify acceptance-relevant factors. In addition to surveys, Web 2.0 poses a huge collection of user comments regarding different technologies. Extracting acceptance-relevant factors and user opinions from such comments requires the application of Natural Language Processing (NLP) methods, particularly...

    Provided By RWSoftware

  • White Papers // May 2012

    Dynamic Cell Association for Downlink Sum Rate Maximization in Multi-Cell Heterogeneous Networks

    In this paper, the authors consider a heterogeneous network consisting in several macro nodes and pico nodes. The goal is to associate users, belonging to this network, to one of the nodes, while maximizing the sum rate of all users. They also want to analyze the load balancing achieved by...

    Provided By RWSoftware

  • White Papers // Jan 2012

    Field Strength Prediction for Environment Aware MIMO Channel Models

    For planning, analysis, and optimization of modern, self organizing radio networks field strength prediction plays an essential role. A huge number of predictions is needed for planning purposes while high quality and level of detail are important as well. In this paper, the authors present a flexible ray optical approach...

    Provided By RWSoftware

  • White Papers // Jan 2012

    Autoregressive Modeling of Frequency Selective Channels for Synchronized OFDM Systems

    In this paper, an Auto-Regressive (AR) channel model for simulating frequency selective channels in synchronized Orthogonal Frequency Division Multiplexing (OFDM) systems is proposed. By frequency domain AR filtering, the number of Rayleigh processes for generating the Channel Frequency Response (CFR) is reduced. Thus, this model is able to achieve a...

    Provided By RWSoftware