SpringCM Inc

Displaying 1-21 of 21 results

  • White Papers // Jun 2013

    Experiences in Building a MOSAIC of Clouds

    The diversity of Cloud computing services is challenging the application developers as various and non-standard interfaces are provided for these services. Few middleware solutions were developed until now to support the design, deployment and execution of service-independent applications as well as the management of resources from multiple Clouds. This paper...

    Provided By SpringCM Inc

  • White Papers // Jun 2013

    Cloud Repositories for Research Data - Addressing the Needs of Researchers

    This paper describes the problems and explores potential solutions for providing long term storage and access to research outputs, focusing mainly on research data. The ready availability of cloud storage and compute services provides a potentially attractive option for curation and preservation of research information. In contrast to deploying infrastructure...

    Provided By SpringCM Inc

  • White Papers // Apr 2013

    Trust Mechanisms for Cloud Computing

    Trust is a critical factor in cloud computing; in present practice it depends largely on perception of reputation, and self assessment by providers of cloud services. The authors begin this paper with a survey of existing mechanisms for establishing trust, and comment on their limitations. They then address those limitations...

    Provided By SpringCM Inc

  • White Papers // Apr 2013

    Cloud Computing for the Architecture, Engineering & Construction Sector: Requirements, Prototype & Experience

    The Architecture, Engineering & Construction (AEC) sector is a highly fragmented, data intensive, project based industry, involving a number of very different professions and organizations. Projects carried out within this sector involve collaboration between various people, using a variety of different systems. This, along with the industry's strong data sharing...

    Provided By SpringCM Inc

  • White Papers // Jan 2013

    A Parallel Cooperative Co-Evolutionary Genetic Algorithm for the Composite SaaS Placement Problem in Cloud Computing

    A composite SaaS (Software as a Service) is a software that is comprised of several software components and data components. The composite SaaS placement problem is to determine where each of the components should be deployed in a cloud computing environment such that the performance of the composite SaaS is...

    Provided By SpringCM Inc

  • White Papers // Dec 2012

    Cognitive Radio Resource Management Exploiting Heterogeneous Primary Users and a Radio Environment Map Database

    The efficient utilization of radio resources is a fundamental issue in Cognitive Radio (CR) networks. Thus, a novel cognitive Radio Resource Management (RRM) is proposed to improve the spectrum utilization efficiency. An optimization framework for RRM is developed that makes the following contributions: considering heterogeneous Primary UserS (PUs) with multiple...

    Provided By SpringCM Inc

  • White Papers // Nov 2012

    Characterization and exploitation of heterogeneous OFDM primary users in cognitive radio networks

    The fundamental features of Cognitive Radio (CR) systems are their ability to adapt to the wireless environment where they operate and their opportunistic occupation of the licensed spectrum bands assigned to the primary network. CR users in CR systems should not cause any interference to Primary Users (PUs) of the...

    Provided By SpringCM Inc

  • White Papers // Oct 2012

    Organisational Knowledge Integration Towards a Conceptual Framework

    This paper analyses organizational knowledge integration processes from a multi-level and systemic perspective, with particular reference to the case of Fujitsu. A conceptual framework for knowledge integration is suggested focusing on team-building capability, capturing and utilizing individual tacit knowledge, and communication networks for integrating dispersed specialist knowledge required in the...

    Provided By SpringCM Inc

  • White Papers // Mar 2012

    A Simple, Adaptable and Efficient Heterogeneous Multi-Tenant Database Architecture for Ad Hoc Cloud

    Data management and sharing is the challenge being faced by all the IT majors today. Adds over it, is the challenge faced by the cloud service providers in terms of multi-tenancy of data and its efficient retrieval. It becomes more complex in a heterogeneous computing environment to provide cloud services....

    Provided By SpringCM Inc

  • White Papers // Mar 2012

    How Novices Model Business Processes

    In this paper, the authors examine the design of business process diagrams in contexts where novice analysts only have basic design tools such as paper and pencils available, and little to no understanding of formalized modeling approaches. Based on a quasi-experimental study with 89 BPM students, they identify five distinct...

    Provided By SpringCM Inc

  • White Papers // Mar 2012

    Merging Business Process Models

    This paper addresses the following problem: given two business process models, create a process model that is the union of the process models given as input. In other words, the behavior of the produced process model should encompass that of the input models. The paper describes an algorithm that produces...

    Provided By SpringCM Inc

  • White Papers // Sep 2011

    Resource Allocation and Scheduling of Multiple Composite Web Services in Cloud Computing Using Cooperative Coevolution

    In cloud computing, resource allocation and scheduling of multiple composite web services is an important and challenging problem. This is especially so in a hybrid cloud where there may be some low-cost resources available from private clouds and some high-cost resources from public clouds. Meeting this challenge involves two classical...

    Provided By SpringCM Inc

  • White Papers // Sep 2011

    Scalable SIMD-parallel memory allocation for many-core machines

    Dynamic memory allocation is an important feature of modern programming systems. However, the cost of memory allocation in massively parallel execution environments such as CUDA has been too high for many types of kernels. In this paper, the authors presents XMalloc, a high-throughput memory allocation mechanism that dramatically magnifies the...

    Provided By SpringCM Inc

  • White Papers // Aug 2011

    Empirical Research in Business Process Management: Introduction to the Special Issue

    In this paper, the authors provide the readers of Information Systems and e-Business Management with an introduction to Business Process Management and the challenges of empirical research in this field. They then briefly describe selected examples of current research efforts in this fields and how the papers accepted for this...

    Provided By SpringCM Inc

  • White Papers // Feb 2011

    A New Degree of Freedom for Memory Allocation in Clusters

    Improvements in parallel computing hardware usually involve increments in the number of available resources for a given application such as the number of computing cores and the amount of memory. In the case of shared-memory computers, the increase in computing resources and available memory is usually constrained by the coherency...

    Provided By SpringCM Inc

  • White Papers // Apr 2010

    Extensions of Access Structures and their Cryptographic Applications

    Secret sharing schemes allow a secret to be distributed among several parties. Roughly speaking, Secret Sharing Schemes - SSS from now on - can force parties to cooperate to perform a certain sensitive task, instead of trusting a single party. For example, a bank requiring that at least two of...

    Provided By SpringCM Inc

  • White Papers // Jul 2009

    Implementing Blocked Sparse Matrix-Vector Multiplication on NVIDIA GPUs

    Modern graphics processors are massively parallel computing devices with outstanding computational power and memory bandwidth. For example, NVIDIA GeForce GTX 285 peaks at 1063 GFLOPS in single precision and 159 GBytes/s memory bandwidth. The authors discuss implementing blocked sparse matrix-vector multiplication for NVIDIA GPUs. They outline an algorithm and various...

    Provided By SpringCM Inc

  • White Papers // Nov 2008

    A Conceptual Data Modelling Methodology for Asset Management Data Warehousing

    In an attempt to turn data management into a profitable enterprise, many businesses are seeking to integrate and centralize their data through data warehousing. A data warehouse then allows businesses to turn data into knowledge, and turn knowledge into tangible profits. One key success factor of a data warehouse lies...

    Provided By SpringCM Inc

  • White Papers // Sep 2008

    Modelling of Service Compositions: Relations to Business Process and Workflow Modelling

    The Service Oriented Architecture (SOA) represents a trend in the IT industry for the development of a flexible and unifying software infrastructure. In an SOA, software components provide their functionality as a service by using uniform interface description and invocation protocols. The provision of software components in an uniform manner...

    Provided By SpringCM Inc

  • White Papers // Jul 2008

    Persuasion for Stronger Passwords: Motivation and Pilot Study

    Text passwords are the ubiquitous method of authentication, used by most people for most online services. Many people choose weak passwords that are vulnerable to attackers who simply guess all the passwords within the most probable password spaces. This paper describes a lightweight password creation mechanism that uses Persuasive Technology...

    Provided By SpringCM Inc

  • White Papers // May 2006

    A Monitoring System for Detecting Repeated Packets with Applications to Computer Worms

    The authors present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses bloom filters with counters. The system analyzes traffic in routers of a network. Their preliminary evaluation of the system involved traffic from their internal lab and a well...

    Provided By SpringCM Inc

  • White Papers // Sep 2011

    Scalable SIMD-parallel memory allocation for many-core machines

    Dynamic memory allocation is an important feature of modern programming systems. However, the cost of memory allocation in massively parallel execution environments such as CUDA has been too high for many types of kernels. In this paper, the authors presents XMalloc, a high-throughput memory allocation mechanism that dramatically magnifies the...

    Provided By SpringCM Inc

  • White Papers // Jul 2009

    Implementing Blocked Sparse Matrix-Vector Multiplication on NVIDIA GPUs

    Modern graphics processors are massively parallel computing devices with outstanding computational power and memory bandwidth. For example, NVIDIA GeForce GTX 285 peaks at 1063 GFLOPS in single precision and 159 GBytes/s memory bandwidth. The authors discuss implementing blocked sparse matrix-vector multiplication for NVIDIA GPUs. They outline an algorithm and various...

    Provided By SpringCM Inc

  • White Papers // Jun 2013

    Cloud Repositories for Research Data - Addressing the Needs of Researchers

    This paper describes the problems and explores potential solutions for providing long term storage and access to research outputs, focusing mainly on research data. The ready availability of cloud storage and compute services provides a potentially attractive option for curation and preservation of research information. In contrast to deploying infrastructure...

    Provided By SpringCM Inc

  • White Papers // Jun 2013

    Experiences in Building a MOSAIC of Clouds

    The diversity of Cloud computing services is challenging the application developers as various and non-standard interfaces are provided for these services. Few middleware solutions were developed until now to support the design, deployment and execution of service-independent applications as well as the management of resources from multiple Clouds. This paper...

    Provided By SpringCM Inc

  • White Papers // Apr 2013

    Trust Mechanisms for Cloud Computing

    Trust is a critical factor in cloud computing; in present practice it depends largely on perception of reputation, and self assessment by providers of cloud services. The authors begin this paper with a survey of existing mechanisms for establishing trust, and comment on their limitations. They then address those limitations...

    Provided By SpringCM Inc

  • White Papers // Apr 2013

    Cloud Computing for the Architecture, Engineering & Construction Sector: Requirements, Prototype & Experience

    The Architecture, Engineering & Construction (AEC) sector is a highly fragmented, data intensive, project based industry, involving a number of very different professions and organizations. Projects carried out within this sector involve collaboration between various people, using a variety of different systems. This, along with the industry's strong data sharing...

    Provided By SpringCM Inc

  • White Papers // Mar 2012

    A Simple, Adaptable and Efficient Heterogeneous Multi-Tenant Database Architecture for Ad Hoc Cloud

    Data management and sharing is the challenge being faced by all the IT majors today. Adds over it, is the challenge faced by the cloud service providers in terms of multi-tenancy of data and its efficient retrieval. It becomes more complex in a heterogeneous computing environment to provide cloud services....

    Provided By SpringCM Inc

  • White Papers // Feb 2011

    A New Degree of Freedom for Memory Allocation in Clusters

    Improvements in parallel computing hardware usually involve increments in the number of available resources for a given application such as the number of computing cores and the amount of memory. In the case of shared-memory computers, the increase in computing resources and available memory is usually constrained by the coherency...

    Provided By SpringCM Inc

  • White Papers // Sep 2008

    Modelling of Service Compositions: Relations to Business Process and Workflow Modelling

    The Service Oriented Architecture (SOA) represents a trend in the IT industry for the development of a flexible and unifying software infrastructure. In an SOA, software components provide their functionality as a service by using uniform interface description and invocation protocols. The provision of software components in an uniform manner...

    Provided By SpringCM Inc

  • White Papers // Nov 2012

    Characterization and exploitation of heterogeneous OFDM primary users in cognitive radio networks

    The fundamental features of Cognitive Radio (CR) systems are their ability to adapt to the wireless environment where they operate and their opportunistic occupation of the licensed spectrum bands assigned to the primary network. CR users in CR systems should not cause any interference to Primary Users (PUs) of the...

    Provided By SpringCM Inc

  • White Papers // Dec 2012

    Cognitive Radio Resource Management Exploiting Heterogeneous Primary Users and a Radio Environment Map Database

    The efficient utilization of radio resources is a fundamental issue in Cognitive Radio (CR) networks. Thus, a novel cognitive Radio Resource Management (RRM) is proposed to improve the spectrum utilization efficiency. An optimization framework for RRM is developed that makes the following contributions: considering heterogeneous Primary UserS (PUs) with multiple...

    Provided By SpringCM Inc

  • White Papers // Jan 2013

    A Parallel Cooperative Co-Evolutionary Genetic Algorithm for the Composite SaaS Placement Problem in Cloud Computing

    A composite SaaS (Software as a Service) is a software that is comprised of several software components and data components. The composite SaaS placement problem is to determine where each of the components should be deployed in a cloud computing environment such that the performance of the composite SaaS is...

    Provided By SpringCM Inc

  • White Papers // Oct 2012

    Organisational Knowledge Integration Towards a Conceptual Framework

    This paper analyses organizational knowledge integration processes from a multi-level and systemic perspective, with particular reference to the case of Fujitsu. A conceptual framework for knowledge integration is suggested focusing on team-building capability, capturing and utilizing individual tacit knowledge, and communication networks for integrating dispersed specialist knowledge required in the...

    Provided By SpringCM Inc

  • White Papers // Mar 2012

    How Novices Model Business Processes

    In this paper, the authors examine the design of business process diagrams in contexts where novice analysts only have basic design tools such as paper and pencils available, and little to no understanding of formalized modeling approaches. Based on a quasi-experimental study with 89 BPM students, they identify five distinct...

    Provided By SpringCM Inc

  • White Papers // Sep 2011

    Resource Allocation and Scheduling of Multiple Composite Web Services in Cloud Computing Using Cooperative Coevolution

    In cloud computing, resource allocation and scheduling of multiple composite web services is an important and challenging problem. This is especially so in a hybrid cloud where there may be some low-cost resources available from private clouds and some high-cost resources from public clouds. Meeting this challenge involves two classical...

    Provided By SpringCM Inc

  • White Papers // Mar 2012

    Merging Business Process Models

    This paper addresses the following problem: given two business process models, create a process model that is the union of the process models given as input. In other words, the behavior of the produced process model should encompass that of the input models. The paper describes an algorithm that produces...

    Provided By SpringCM Inc

  • White Papers // May 2006

    A Monitoring System for Detecting Repeated Packets with Applications to Computer Worms

    The authors present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses bloom filters with counters. The system analyzes traffic in routers of a network. Their preliminary evaluation of the system involved traffic from their internal lab and a well...

    Provided By SpringCM Inc

  • White Papers // Jul 2008

    Persuasion for Stronger Passwords: Motivation and Pilot Study

    Text passwords are the ubiquitous method of authentication, used by most people for most online services. Many people choose weak passwords that are vulnerable to attackers who simply guess all the passwords within the most probable password spaces. This paper describes a lightweight password creation mechanism that uses Persuasive Technology...

    Provided By SpringCM Inc

  • White Papers // Aug 2011

    Empirical Research in Business Process Management: Introduction to the Special Issue

    In this paper, the authors provide the readers of Information Systems and e-Business Management with an introduction to Business Process Management and the challenges of empirical research in this field. They then briefly describe selected examples of current research efforts in this fields and how the papers accepted for this...

    Provided By SpringCM Inc

  • White Papers // Apr 2010

    Extensions of Access Structures and their Cryptographic Applications

    Secret sharing schemes allow a secret to be distributed among several parties. Roughly speaking, Secret Sharing Schemes - SSS from now on - can force parties to cooperate to perform a certain sensitive task, instead of trusting a single party. For example, a bank requiring that at least two of...

    Provided By SpringCM Inc

  • White Papers // Nov 2008

    A Conceptual Data Modelling Methodology for Asset Management Data Warehousing

    In an attempt to turn data management into a profitable enterprise, many businesses are seeking to integrate and centralize their data through data warehousing. A data warehouse then allows businesses to turn data into knowledge, and turn knowledge into tangible profits. One key success factor of a data warehouse lies...

    Provided By SpringCM Inc