RWTH Aachen University

Displaying 1-40 of 541 results

  • White Papers // May 2015

    Finding Similar Products in E-commerce Sites Based on Attributes

    In this paper, the authors present a preliminary study on the problem of finding products similar to a product given as input, based solely on their attributes. They assume that they are given a set of products from a same category of a same on-line store, were each product is...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    On Axiomatization and Inference Complexity over a Hierarchy of Functional Dependencies

    Functional Dependencies (FDs) have recently been extended for data quality purposes with various notions of similarity instead of strict equality. The authors study these extensions in this paper. They begin by constructing a hierarchy of dependencies, showing which dependencies generalize others. They then focus on an extension of FDs that...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    Data Integration With Many Heterogeneous Sources and Dynamic Target Schemas

    Information integration is the general problem that arises in applications that need to consolidate (in a virtual or materialized way) data coming from different sources. In this paper, the authors consider a scenario for data integration, very common in practice, for which existing solutions are not effective. They refer to...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    IMGpedia: A Proposal to Enrich DBpedia with Image Meta-Data

    In this paper, the authors introduce IMGpedia: a research proposal aiming to bridge structured knowledge-bases and multimedia content. Their concrete plan is to enrich DBpedia data with further metadata about images from Wikipedia, including content-based visual descriptors. Their concrete goal is to create a unified querying and inference system that...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    Saturation, Definability, and Separation for XPath on Data Trees

    In this paper, the authors study the expressive power of some fragments of XPath equipped with inequality tests over data trees. The authors' main results are the definability theorems, which give necessary and sufficient conditions under which a class of data trees can be defined by a node expression or...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    Discovering and Querying Hybrid Linked Data

    In this paper, the authors present a unified framework for discovering and querying hybrid linked data. They describe their approach to developing a natural language query interface for a hybrid knowledge base Wikitology, and present that as a case study for accessing hybrid information sources with structured and unstructured data...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    Describing Linked Data Platform Applications with the Hydra Core Vocabulary

    The Linked Data Platform (LDP) W3C Recommendation provides a standard protocol and a set of best practices for the development of read-write Linked Data applications based on HTTP access to Web resources that describe their state using the RDF (Resource Description Framework) data model. The hydra core vocabulary is an...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    Building REST APIs for the Robot Operating System - Mapping Concepts and Interaction

    The vision of the Web of Things (WoTs) aims to leverage Web standards in order to interconnect all types of embedded devices and real-world objects, and thus to make them a part of the WWW. Therefore, WoT aims to build a future Web of devices that is truly open, flexible,...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    A BASILar Approach for Building Web APIs on top of SPARQL Endpoints

    The heterogeneity of methods and technologies to publish open data is still an issue to develop distributed systems on the Web. On the one hand, Web APIs (Application Programming Interfaces), the most popular approach to offer data services, implement REST principles, which focus on addressing loose coupling and interoperability issues....

    Provided By RWTH Aachen University

  • White Papers // May 2015

    The Linked Data Mining Challenge 2015

    In this paper, the authors have discussed the task, dataset, and results of the Linked Data Mining Challenge 2015. The submissions show that Linked Open Data is a useful source of information for data mining, and that it can help to build good predictive models. On the other hand, the...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    Predicting Metacritic Film Reviews Using Linked Open Data and Semantic Technologies

    Using linked open data, the authors are finally able to test and quantify Aristotle's theory. By using the flexible data representation of RDF (Resource Description Framework) as well as the graph-oriented nature of SPARQL, they attempt to answer the questions: What makes a movie good? And more specifically, what makes...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    Towards Linked Data Fact Validation through Measuring Consensus

    In the context of linked open data, different datasets can be interlinked together, thereby providing rich background knowledge for a dataset under examination. The authors believe that knowledge from interlinked datasets can be used to validate the accuracy of a linked data fact. In this paper, they present a novel...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    Aspect-Oriented User Interface Design for Android Applications

    In this paper, the authors deal with the design of an effective Android framework that will allow a developer to create Android applications easily in a short time with the help of aspect-oriented approach. Their solution enables to deal with separated aspects like security, layout, input validation, data binding and...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    Biased k-NN Similarity Content Based Prediction of Movie Tweets Popularity

    In this paper, the authors describe details of their approach to the RecSys challenge 2014: user engagement as evaluation. The challenge was based on a dataset, which contains tweets that are generated when users rate movies on IMDb (using the iOS app in a smartphone). The challenge for participants is...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    Critical Evaluation of Existing External Sorting Methods in the Perspective of Modern Hardware

    External sorting methods which are designed to order large amounts of data stored in persistent memory are well known for decades. These methods were originally designed for systems with small amount of operating (internal) memory and magnetic tapes used as external memory. Data on magnetic tapes has to be accessed...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    Parallel Approach to Context Transformations

    There are two main classes of algorithms employed in the data compression. The first class of algorithms deals directly with the compression and their purpose is to decrease the size of the input message. Context transformation is a process that turns input data into one with lower zero order entropy....

    Provided By RWTH Aachen University

  • White Papers // May 2015

    Vocabulary for Linked Data Visualization Model

    There is already a vast amount of Linked Data on the web. What is missing is a convenient way of analyzing and visualizing the data that would benefit from the Linked Data principles. In the previous paper, the authors introduced the Linked Data Visualization Model (LDVM). It is a formal...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    A Survey on Music Retrieval Systems Using Microphone Input

    Interactive music retrieval systems using microphone input have become popular, with applications ranging from whistle queries to robust audio search engines capable of retrieving music from a short sample recorded in noisy environment. The availability for mobile devices brought them to millions of users. Underlying methods have promising results in...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    Data Structures for Indexing Triple Table

    Semantic-based approaches are relatively new technologies. Some of these technologies are supported by specifications of W3 consortium, i.e. RDF, SPARQL and so on. There are many areas where semantic data can be utilized, e.g. social networks, annotation of protein sequences etc. From the physical database design point of view, several...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    UnifiedViews: Towards ETL Tool for Simple yet Powerfull RDF Data Management

    In this paper, the authors present UnifiedViews, an Extract-Transform-Load (ETL) framework that allows users to define, execute, monitor, debug, schedule, and share ETL data processing tasks, which may employ custom plugins (data processing units, DPUs) created by users. UnifiedViews differs from other ETL frameworks by natively supporting RDF (Resource Description...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    An Archiving System for Managing Evolution in the Data Web

    The rising data Web has brought forth the requirement to treat in-formation as dynamically evolving aggregations of data from remote and heterogeneous sources, creating the need for intelligent management of the change-driven aspects of the underlying evolving entities. Datasets change in multiple levels, such as evolving semantics, as well as...

    Provided By RWTH Aachen University

  • White Papers // May 2015

    Scalable Semantic Version Control for Linked Data Management

    Linked data is the semantic Web's established standard for publishing and interlinking data. When authors collaborate on a data set, distribution and tracking of changes are crucial aspects. Several approaches for version control were presented in this area each focusing on different aspects and bounded to different limitations. In this...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Ontology Consistency and Instance Checking For Real World Linked Data

    Much large ontology have been created which make use of OWL's (Ontology Web Language) expressiveness for specification. However, tools to ensure that instance data is in compliance with the schema are often not well integrated with triple-stores and cannot detect certain classes of schema-instance inconsistency due to the assumptions of...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Certifying the Interoperability of RDF Database Systems

    In March 2013, the W3C recommended SPARQL to retrieve and manipulate decentralized RDF (Resource Description Framework) data. Real-world usage requires advanced features of SPARQL recommendations. As these are not consistently implemented, the authors propose a test framework named TFT (Tests For Triple stores) to test the interoperability of the SPARQL...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Towards Reconciling SPARQL and Certain Answers

    SPARQL entailment regimes are strongly in influenced by the big body of works on ontology-based query answering, notably in the area of Description Logics (DLs). However, the semantics of query answering under SPARQL entailment regimes is defined in a more naive and much less expressive way than the certain answer...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Extending Datalog with Analytics in LogicBlox

    LogicBlox is a database product designed for enterprise software development, combining transactions and analytics. The underlying data model is a relational database, and the query language, LogiQL, is an extension of Datalog. As such, LogiQL features a simple and unified syntax for traditional relational manipulation as well as deeper analytics....

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Disentangling the Notion of Dataset in SPARQL

    The concept of dataset in SPARQL is introduced in several different parts of the W3C documentation. The notion of dataset in SPARQL seems to be neither a simple nor a well-defined notion. In this paper, the authors first review the literature, current documentation and SPARQL engines to show the sublet...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Implementing Data-Centric Dynamic Systems over a Relational DBMS

    In this paper, the authors proposed a model called Data-Centric Dynamic System (DCDS), which can be seen as a framework for modeling and verification of systems where both the process controlling the dynamics and the manipulation of data are equally central. More specifically, a DCDS consists of a data layer...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Navigational Queries Based on Frontier-Guarded Datalog: Preliminary Results

    In this paper, the authors introduce a navigational query language that extends binary frontier-guarded datalog by allowing regular expressions in rule bodies and a limited use of higherarity intentional predicates. Their query language strictly extends Conjunctive Two-way Regular Path Queries (C2RPQs) and captures some of the key features advocated in...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Exploiting Semantics to Predict Potential Novel Links from Dense Subgraphs

    Knowledge graphs encode semantic knowledge that can be exploited to enhance different data management tasks, e.g., query answering, ranking, or data mining. The authors tackle the problem of predicting interactions between drugs and targets, and propose esDSG, an unsupervised approach able to predict links from subgraphs that are not only...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    A Database Framework for Classifier Engineering

    In the design of machine-learning solutions, a critical and often the most resourceful task is that of feature engineering, for which recipes and tooling have been developed. In this paper, the authors embark on the establishment of database foundations for feature engineering. They propose a formal framework for classification, in...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Towards Capturing and Preserving Changes on the Web of Data

    Existing Web archives aim to capture and preserve the changes of documents on the Web and provide data corpora of high value which are used in various areas (e.g. to optimize algorithms or to study the Zeitgeist of a generation). So far, the Web archives concentrate their e orts to...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Implementing Graph Query Languages over Compressed Data Structures: A Progress Report

    Graph databases have recently gained a lot of attention in theory and practice. This can be explained by the current need of handling Web-related data, such as on-line social networks, and RDF (Resource Description Framework) and Semantic Web data. In this paper, the authors present their preliminary results on implementing...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Intuitionistic Data Exchange

    The field of data exchange has overcome many obstacles, but when it comes to negation in rule bodies combined with existentially quantified variables in rule heads, to inequalities x, as well as to inconsistency management, the same intractability barriers that plague the area of incomplete information arise. In this paper,...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Towards Efficient Archiving of Dynamic Linked Open Data

    The Linked Data paradigm has enabled a huge shared infrastructure for connecting data from different domains which can be browsed and queried together as a huge knowledge base. However, structured interlinked datasets in this Web of data are not static but continuously evolving, which suggests the investigation of approaches to...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Chase Termination for Guarded Existential Rules

    The chase procedure is considered as one of the most fundamental algorithmic tools in database theory. It has been successfully applied to different database problems such as data exchange, and query answering and containment under constraints, to name a few. One of the central problems regarding the chase procedure is...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Utilizing the Open Movie Database API for Predicting the Review Class of Movies

    In this paper, the authors present their contribution to the linked data mining challenge 2015. Their approach predicts the review class of movies using external data from the Open Movie Database API (OMDb-API). They select specific features, such as movie ratings and box office that are very likely to describe...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    LDQL: A Language for Linked Data Queries

    In this paper, the authors propose (LDQL) Linked Data Query Language on the web. The novelty of LDQL is that it enables a user to express separately patterns that describe the expected query result, and Web navigation paths that select the data sources to be used for computing the result....

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    On the CALM Principle for BSP Computation

    In recent times, considerable emphasis has been given to two apparently disjoint research topics: data-parallel and eventually consistent, distributed systems. In this paper, the authors propose a study on an eventually consistent, data parallel computational model, the keystone of which is provided by the recent finding that a class of...

    Provided By RWTH Aachen University

  • White Papers // Apr 2015

    Approximation Algorithms for Schema-Mapping Discovery from Data Examples

    In recent years, data examples have been at the core of several different approaches to schema-mapping design. In particular, the researchers introduced a framework for schema-mapping discovery from a single data example, in which the derivation of a schema mapping is cast as an optimization problem. Their goal is to...

    Provided By RWTH Aachen University

  • White Papers // Jul 2010

    Parallel Processing of Data From Very Large-Scale Wireless Sensor Networks

    In this paper the authors explore the problems of storing and reasoning about data collected from very large-scale Wireless Sensor Networks (WSNs). Potential worldwide deployment of WSNs for, e.g., environmental monitoring purposes could yield data in amounts of petabytes each year. Distributed database solutions such as BigTable and Hadoop are...

    Provided By RWTH Aachen University

  • White Papers // Jul 2009

    QMetric - A Metric Tool Suite for the Evaluation of Software Process Data

    Configuration and change request management systems offer valuable information for the assessment of process quality characteristics. The definition of appropriate metrics that address the information needs of an organization is an intricate task. The authors present the QMetric tool suite which provides a general infrastructure for specifying metrics, relating them...

    Provided By RWTH Aachen University

  • White Papers // May 2011

    Cost Evaluation Of Credit Risk Securitization In The Electricity Industry: Credit Default Acceptance Vs. Margining Costs

    Institutions such as the European Commission (EC) are currently seeking to increase the transparency of the derivatives markets. This course of action includes in particular the installation of a centralized clearing entity and with this the obligation to clear all relevant financial derivatives. Besides the expected securitization of the financial...

    Provided By RWTH Aachen University

  • White Papers // Apr 2011

    Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets

    In this paper, the authors introduce the first protocols for multi-party, privacy-preserving, fair reconciliation of ordered sets. The contributions are twofold. First, they show that it is possible to extend the round-based construction for fair, two-party privacy-preserving reconciliation of ordered sets to multiple parties using a multi-party privacy-preserving set intersection...

    Provided By RWTH Aachen University

  • White Papers // Jul 2011

    Mobile Cloud Computing: A Comparison of Application Models

    Cloud computing is an emerging concept combining many fields of computing. The foundation of cloud computing is the delivery of services, software and processing capacity over the Internet, reducing cost, increasing storage, automating systems, decoupling of service delivery from underlying technology, and providing flexibility and mobility of information. However, the...

    Provided By RWTH Aachen University

  • White Papers // Jul 2010

    Distributed Storage and Parallel Processing in Large-Scale Wireless Sensor Networks

    In this paper, the authors explore the problems of storing and reasoning about data collected from very large-scale Wireless Sensor Networks (WSNs). Potential worldwide deployment of WSNs for, e.g., environmental monitoring purposes could yield data in amounts of petabytes each year. Distributed database solutions such as BigTable and Hadoop are...

    Provided By RWTH Aachen University

  • White Papers // Oct 2010

    Using Cognitive Radio Principles for Wireless Resource Management in Home Networking

    The demand for higher data rates, capacity and better quality-of-service is constantly growing for home networks. Therefore, there is a pressing need for efficient use of wireless network resources. In this paper, the application of cognitive radio principles that enable network nodes to characterize their environment and control their resources...

    Provided By RWTH Aachen University

  • White Papers // Aug 2009

    Exploring Simulated Annealing and Graphical Models for Optimization in Cognitive Wireless Networks

    In this paper, the authors discuss the design of optimization algorithms for Cognitive Wireless Networks (CWNs). Maximizing the perceived network performance towards applications by selecting appropriate protocols and carrying out cross-layer optimization on the resulting stack is a key functionality of any CWN. They take a "Black box" approach to...

    Provided By RWTH Aachen University

  • White Papers // Sep 2010

    Enabling Secondary Access Through Robust Primary User Channel Assignment

    A common concept to mitigate the effects of spectrum scarcity is to allow opportunistic Dynamic Spectrum Access (DSA) to licensed frequency bands. In this paper, the license holder may experience a decrease in the performance of its network. For cellular networks this may lead to unwanted coverage holes at locations...

    Provided By RWTH Aachen University

  • White Papers // Sep 2010

    An Implementation of Cognitive Resource Management on LTE Platform

    In this paper, the authors describe an LTE based demonstrator of the Universal Link Layer API (ULLA) and Cognitive Resource Manager (CRM) modules that are developed in ARAGORN project. The demonstrated LTE system comprises one LTE TDD eNode B and one User Equipment (UE). They first introduce ULLA and CRM...

    Provided By RWTH Aachen University

  • White Papers // Jun 2001

    Monitoring Public Perception of Medical Products by Automatically Assigning Metadata to Online Discussion Group Postings

    This paper describes an ongoing project whose goal is to create a digital library of public perceptions of over-the-counter and prescription drugs. The Web has created an unprecedented opportunity to mine and organize public perceptions and experiences with medications. There are hundreds of chat rooms devoted to medical conditions and...

    Provided By RWTH Aachen University

  • White Papers // Jul 2009

    Flexible Multi-Dimensional Visualization of Process Enactment Data

    The management of development processes is a challenging task and needs adequate tool support. In the course of a development project, many different engineering and management processes are enacted and have to be controlled. The management data has an inherently multidimensional character. Most project and process management systems fail to...

    Provided By RWTH Aachen University

  • White Papers // Jan 2010

    Secure Roaming and Handover Procedures in Wireless Access Networks

    A growing number of wireless technologies and providers, as well as users increasing need and desire to be connected and reachable at all times, call for solutions that enable interoperation between providers and technologies. Roaming procedures enable wireless access in areas that are covered by network providers with which the...

    Provided By RWTH Aachen University

  • White Papers // Jul 2009

    The EIFFEL Approach Towards Visions for a Future Networked Society

    The Internet was not designed to be a critical part of the economy - but it has become exactly that. In fact, it has become a critical infrastructure for the overall society in developed countries. There are many questions today on how the Internet will or should develop in the...

    Provided By RWTH Aachen University

  • White Papers // May 2012

    Hackers in Your Pocket: A Survey of Smartphone Security Across Platforms

    In the past research on smart phone operating system security has been scattered over blog posts and other non-archival publications. Over the last 5 years with advent of Android, iOS and Windows Phone 7, an increasing amount of research has also been published in the academic sphere on individual security...

    Provided By RWTH Aachen University

  • White Papers // Nov 2009

    Low-Latency Linux Drivers for Ethernet Over High-Speed Networks

    Now-a-days, high computing demands are often tackled by clusters of single computers, each of which is basically an assembly of a growing number of CPU cores and main memory, also called a node; these nodes are connected by some kind of communication network. With the growing speed and number of...

    Provided By RWTH Aachen University

  • White Papers // Apr 2010

    Evaluation of Quality of Experience for Video Streaming Over Dynamic Spectrum Access Systems

    In this paper, the authors study the problem of quantifying the value of spectrum opportunities to secondary users in Dynamic Spectrum Access (DSA) systems. They especially focus on estimating the impact of key channel parameters, namely the activity patterns of the primary users on the expected quality of experience for...

    Provided By RWTH Aachen University

  • White Papers // Aug 2012

    A Rendezvous Protocol with the Heterogeneous Spectrum Availability Analysis for Cognitive Radio Ad Hoc Networks

    In Cognitive Radio Ad Hoc Networks (CRANs) a frequently changing environment, licensed holders channel occupancy and heterogeneous spectrum availability result in a need of on-demand searching for a control traffic channel by CR users in order to be able to initiate a communication. A RenDezVous (RDV) is therefore a new...

    Provided By RWTH Aachen University

  • White Papers // Jul 2012

    Quorum Systems Towards an Asynchronous Communication in Cognitive Radio Networks

    This paper studies Quorum Systems (QS) and relevant properties, originally and widely used in the scope of operating systems and currently being applied in wireless communications. The objective of this paper is threefold. This paper gives a comprehensive guidance on QSs and their usage. And it shows that QS properties...

    Provided By RWTH Aachen University

  • White Papers // Jun 2011

    A Multi-Objective Approach for Data Collection in Wireless Sensor Networks

    Wireless Sensors Networks (WSNs) are deployed to collect huge amounts of data from the environment. This produced data has to be delivered through sensor's wireless interface using multi-hop communications toward a sink. The position of the sink impacts the performance of the wireless sensor network regarding delay and energy consumption...

    Provided By RWTH Aachen University

  • White Papers // Jun 2010

    Demo Abstract: A Decentralized MAC Protocol for Opportunistic Spectrum Access in Cognitive Wireless Networks

    Cognitive MACs are becoming a reality for efficiently utilizing the constrained spectral resources. The spectrum opportunities are volatile and often difficult to predict. Furthermore, infrastructure based coordinated spectrum sharing is not a viable option for some applications and spectrum bands. Therefore, dynamic and decentralized medium access becomes highly desirable. The...

    Provided By RWTH Aachen University

  • White Papers // Feb 2011

    Multihop Wireless Channel Models Suitable for Stochastic Petri Nets and Markov State Analysis

    In this paper the system analysis of modern wireless systems is simplified by providing simple yet powerful models for the wireless channel in the environment of higher layer abstract system descriptions with generalized Stochastic Petri Nets (SPN). This modeling approach is capable of deriving performance metrics in terms of packet...

    Provided By RWTH Aachen University

  • White Papers // Dec 2009

    Enabling Resource-Oriented Mobile Web Server for Short-Lived Services

    Mobile Web Services (MobWSs) are a promising technology for the integration of Information Technology (IT) and TeleCommunication (TelCo) domains. The advancements in mobile communication and device technology, in terms of software and hardware, have revolutionized the focus of research and industry to investigate mobile service provisioning platforms and architectures. In...

    Provided By RWTH Aachen University

  • White Papers // Aug 2011

    Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco Cloud

    With recent developments in cloud computing, a paradigm shift from rather static deployment of resources to more dynamic, on-demand practices means more flexibility and better utilization of resources. This demands new ways to efficiently configure networks. In this paper, the authors will characterize a class of competitive cloud services that...

    Provided By RWTH Aachen University

  • White Papers // Jun 2010

    Expanding the Event Horizon in Parallelized Network Simulations

    The simulation models of wireless networks rapidly increase in complexity to accurately model wireless channel characteristics and the properties of advanced transmission technologies. Such detailed models typically lead to a high computational load per simulation event that accumulates to extensive simulation runtimes. Reducing runtimes through parallelization is challenging since it...

    Provided By RWTH Aachen University

  • White Papers // Jul 2011

    Green Communications by Demand Shaping and User-in-the-Loop Tariff-Based Control

    The new field of green communications can be divided into energy-efficient communications equipment or using information and communication technology to improve the world to become more energy aware. Mobile data traffic and utility energy consumption have a lot in common. There is a limited supply due to limited resources, and...

    Provided By RWTH Aachen University

  • White Papers // May 2011

    Security and Privacy Implications of URL Shortening Services

    URL shortening services replace long URLs with shorter ones and subsequently redirect all requests for the shortened URL to the original long URL. In this paper, the authors discuss and empirically analyze security and privacy risks caused by the use of URL shortening services. They empirically determine the most popular...

    Provided By RWTH Aachen University

  • White Papers // Dec 2009

    Polytool: Polynomial Interpretations as a Basis for Termination Analysis of Logic Programs

    The authors' goal is to study the feasibility of porting termination analysis techniques developed for one programming paradigm to another paradigm. In this paper, they show how to adapt termination analysis techniques based on polynomial interpretations - very well known in the context of Term Rewrite Systems (TRSs) - to...

    Provided By RWTH Aachen University

  • White Papers // Apr 2010

    Placing Regenerators in Optical Networks to Satisfy Multiple Sets of Requests

    The placement of regenerators in optical networks has become an active area of research during the last years. Given a set of light-paths in a network G and a positive integer d, regenerators must be placed in such a way that in any light-path there are no more than d...

    Provided By RWTH Aachen University

  • White Papers // Apr 2011

    Secure Resolution of End-Host Identifiers for Mobile Clients

    Many efforts of the network research community focus on the introduction of a new identifier to relieve the IP address from its dual role of end-host identifier and routable locator. This identifier-locator split introduces a new identifier between human readable domain names and routable IP addresses. Mapping between identifiers and...

    Provided By RWTH Aachen University

  • White Papers // Feb 2010

    Dynamic TinyOS: Modular and Transparent Incremental Code-Updates for Sensor Networks

    Long-term deployments of sensor networks in physically inaccessible environments make remote re-programmability of sensor nodes a necessity. Ranging from full image replacement to virtual machines, a variety of mechanisms exist today to deploy new software or to fix bugs in deployed systems. However, TinyOS - the current state of the...

    Provided By RWTH Aachen University

  • White Papers // Jun 2012

    Torus Quorum System and Difference Set-Based Rendezvous in Cognitive Radio Ad Hoc Networks

    In Cognitive Radio Ad Hoc Networks (CRANs) a frequently changing environment and Primary Users channel occupancy result in a need of the searching for a common control channel by Secondary Users in order to be able to initiate a communication. A RenDezvous (RDV) is therefore a new challenge, not encountered...

    Provided By RWTH Aachen University

  • White Papers // Jan 2012

    Introducing SOR: SSH-Based Onion Routing

    Traditional low-latency anonymization techniques apply non-standardized, complex, and often even proprietary protocols. Apart from poor performance, the high development effort leads to the existence of at most one single implementation. This in turn increases the risk of creating so-called software monocultures, where failures in the single implementation can compromise the...

    Provided By RWTH Aachen University

  • White Papers // Sep 2011

    Lightweight Hidden Services

    Hidden Services (HS) are mechanisms designed to provide network services while preserving anonymity for the identity of the server. Besides protecting the identity of the server, hidden services help to resist censorship, are resistant against distributed DoS attacks, and allow server functionality even if the service provider does not own...

    Provided By RWTH Aachen University

  • White Papers // Nov 2009

    Crowds Revisited: Practically Effective Predecessor Attack

    Crowds is a peer-to-peer system for protecting users' anonymity for web transactions. One of the more serious disadvantages of it is the degree of anonymity provided with respect to the colluding system members: the one who forwards a message to a colluding node is more likely to be the originator...

    Provided By RWTH Aachen University

  • White Papers // Nov 2009

    Using Trust to Resist Censorship in the Presence of Collusion

    Censorship resistance deals with an attempt to prevent censors from the acquaintance and thus blocking of distribution of a particular content through the network. Providing resistance against censoring is a very challenging and difficult task to achieve. However it is vital for the purpose of freedom of speech, mind and...

    Provided By RWTH Aachen University

  • White Papers // Nov 2009

    Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication

    There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generalize or even identify in real networks. While some papers distinct different attacker types, the usual approach is to present an anonymization technique...

    Provided By RWTH Aachen University

  • White Papers // Jan 2012

    Generalised Link-Layer Optimisation: Application and Performance Evaluation

    A wireless communication system work more efficiently if link-layer parameters such as modulation order, symbol rate and packet size are (adaptively) optimised. A common criterion is to maximise spectral efficiency subject to a very low bit-error constraint. But for systems equipped with strong error detection and a selective packet re-transmission...

    Provided By RWTH Aachen University

  • White Papers // Jan 2010

    Promoting Power to a First Class Metric in Network Simulations

    Accurate prediction of energy consumption early in the design process is essential to efficiently optimize algorithms and protocols. However, despite energy efficiency gathering significant attention in networking research, limited effort has been invested in providing requisite evaluation tools and models. Hence, developers demand powerful evaluation tools to assist them in...

    Provided By RWTH Aachen University

  • White Papers // Sep 2011

    Enabling Run-Time Utility-Based Optimization Through Generic Interfaces in Wireless Networks

    In this paper, the authors address the use of utility-based optimization in wireless networks. Their optimization approach is enabled by well-defined, technology- and platform-independent generic interfaces. The latter provide an abstract and unified representation of data and services available from the protocol stack, ranging from old legacy protocols to newer...

    Provided By RWTH Aachen University