Springer Healthcare

Displaying 1-40 of 704 results

  • White Papers // Aug 2014

    Competitive Location in Cognitive Radio Networks

    In this paper, the authors address the problem of strategic base stations placement in cognitive radio networks. They consider a primary user, operating on the frequency channels of a primary network, and an operator (a leader) facing the competition of a second operator (a follower). These operators are willing to...

    Provided By Springer Healthcare

  • White Papers // Jul 2014

    Geometrical Localization Algorithm for 3-D Wireless Sensor Networks

    In this paper, the authors propose an efficient range free localization scheme for large scale three dimensional wireless sensor networks. Their system environment consists of two type of sensors, randomly deployed static sensors and global positioning system equipped moving sensors. These moving anchors travels across the network field and broadcast...

    Provided By Springer Healthcare

  • White Papers // Jun 2014

    A Comparative Study on Resource Allocation and Energy Efficient Job Scheduling Strategies in Large-Scale Parallel Computing Systems

    In the large-scale parallel computing environment, resource allocation and energy efficient techniques are required to deliver the Quality of Services (QoS) and to reduce the operational cost of the system. Because the cost of the energy consumption in the environment is a dominant part of the owner's and user's budget....

    Provided By Springer Healthcare

  • White Papers // Jun 2014

    Phoenix: DGA-Based Botnet Tracking and Intelligence

    Modern botnets rely on Domain-Generation Algorithms (DGAs) to build resilient command-and-control infrastructures. Given the prevalence of this mechanism, recent paper has focused on the analysis of DNS traffic to recognize botnets based on their DGAs. While previous paper has concentrated on detection, the authors focus on supporting intelligence operations. They...

    Provided By Springer Healthcare

  • White Papers // Jun 2014

    A Survey and Taxonomy on Energy Efficient Resource Allocation Techniques for Cloud Computing Systems

    In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application (e.g., content delivery networks, MapReduce, web applications, and the like) workloads having contentious allocation requirements in terms of...

    Provided By Springer Healthcare

  • White Papers // Jun 2014

    Dual-Access Way-Prediction Cache for Embedded Systems

    Way-Prediction (WP) caches have advantages of reducing power consumption and latency for highly associative data caches and thus are favorable for embedded systems. In this paper, the authors propose an enhanced way-prediction cache, Dual-Access Way-Prediction (DAWP) cache, to cope with the weakness of the WP cache. The prediction logic designed...

    Provided By Springer Healthcare

  • White Papers // May 2014

    Instruction-Level Steganography for Covert Trigger-Based Malware

    Trigger-based malware is designed to remain dormant and undetected unless a specific trigger occurs. Such behavior occurs in prevalent threats such as backdoors and environment-dependent (targeted) malware. Currently, trigger-based malicious code is often hidden in rarely exercised code paths in benign host binaries, and relies upon a lack of code...

    Provided By Springer Healthcare

  • White Papers // Apr 2014

    CubeLoad: A Parametric Generator of Realistic OLAP Workloads

    Differently from OLTP workloads, OLAP workloads are hardly predictable due to their inherently extemporary nature. Besides, obtaining real OLAP workloads by monitoring the queries actually issued in companies and organizations is quite hard. On the other hand, hardware and software benchmarking in the industrial world, as well as comparative evaluation...

    Provided By Springer Healthcare

  • White Papers // Apr 2014

    WABRM: A Work-Load Aware Balancing and Resource Management Framework for Swift on Cloud

    Fueled by increasing demand of big data processing, distributed storage systems have been more and more widely used by enterprises. However, in these systems, few storage nodes holding enormous amount of hotspot data could become bottlenecks. This stems from the fact that most typical distributed storage systems mainly provide data...

    Provided By Springer Healthcare

  • White Papers // Apr 2014

    An Overview of the Commercial Cloud Monitoring Tools: Research Dimensions, Design Issues, and State-of-the-Art

    Cloud monitoring activity involves dynamically tracking the Quality of Service (QoS) parameters related to virtualized resources (e.g., VM, storage, network, appliances, etc.), the physical resources they share, the applications running on them and data hosted on them. Applications and resources configuration in cloud computing environment is quite challenging considering a...

    Provided By Springer Healthcare

  • White Papers // Apr 2014

    Evaluation Methodology for Data Communication-Aware Application Partitioning

    Heterogeneous multicore architectures appear to be a promising solution to the ever-increasing computational demands of applications in embedded as well as high-performance computing domains. Nevertheless, inefficient application partitioning for such systems may result in a considerable reduction in the anticipated performance improvement. Consequently, proper mechanisms are required to evaluate quality...

    Provided By Springer Healthcare

  • White Papers // Mar 2014

    Hierarchical Approach to Optimization of Parallel Matrix Multiplication on Large-Scale Platforms

    Many state-of-the-art parallel algorithms, which are widely used in scientific applications executed on high-end computing systems, were designed in the twentieth century with relatively small-scale parallelism in mind. Indeed, while in 1990s a system with few hundred cores was considered a powerful supercomputer; modern top supercomputers have millions of cores....

    Provided By Springer Healthcare

  • White Papers // Feb 2014

    Unmixing-Based Content Retrieval System for Remotely Sensed Hyperspectral Imagery on GPUs

    In this paper the authors present a new unmixing-based retrieval system for remotely sensed hyperspectral imagery. The need for this kind of system is justified by the exponential growth in the volume and number of remotely sensed data sets from the surface of the earth. This is particularly the case...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    Measuring Precision of Modeled Behavior

    Conformance checking techniques compare observed behavior (i.e., event logs) with modeled behavior for a variety of reasons. For example, discrepancies between a normative process model and recorded behavior may point to fraud or inefficiencies. The resulting diagnostics can be used for auditing and compliance management. Conformance checking can also be...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    Transactional Support for Adaptive Indexing

    Adaptive indexing initializes and optimizes indexes incrementally, as a side effect of query processing. The goal is to achieve the benefits of indexes while hiding or minimizing the costs of index creation. However, index-optimizing side effects seem to turn read-only queries into update transactions that might, for example, create lock...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    DynTunKey: A Dynamic Distributed Group Key Tunneling Management Protocol for Heterogeneous Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are being used for many applications ranging from mobile target surveillance to intelligent home networking. Due to the sensitive nature of the data transmitted by these applications, appropriate protection mechanisms are needed to prevent attackers from exploiting the weaknesses of the radio links. In this paper,...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    ADLU: A Novel Anomaly Detection and Location-Attribution Algorithm for UWB Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics. Besides energy consumption considerations, security has emerged as an equally important aspect in their network design. This is because WSNs are vulnerable to various types of attacks and to node compromises,...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    Big Data: A Survey

    In this paper, the authors review the background and state-of-the-art of big data. They first introduce the general background of big data and review related technologies, such as could computing, Internet of Things, data centers, and Hadoop. They then focus on the four phases of the value chain of big...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    InterCloud RAIDer: A Do-It-Yourself Multi-Cloud Private Data Backup System

    In this paper, the authors introduce InterCloud RAIDer, which realizes a multi-cloud private data backup system by composing a data deduplication technique to reduce the overall storage overhead, erasure coding to achieve redundancy at low overhead, which is dispersed across multiple cloud services to realize fault-tolerance against individual service providers,...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    A Decision Framework for Placement of Applications in Clouds That Minimizes Their Carbon Footprint

    Cloud computing gives users much freedom on where they host their computation and storage. However, the CO2 emission of a job depends on the location and the energy efficiency of the data centers where it is run. The authors developed a decision framework that determines to move computation with accompanying...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    An Improved Task Assignment Scheme for Hadoop Running in the Clouds

    Now-a-days, data-intensive problems are so prevalent that numerous organizations in various industries have to face them in their business operation. It is often crucial for enterprises to have the capability of analyzing large volumes of data in an effective and timely manner. MapReduce and its open-source implementation Hadoop dramatically simplified...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Data Management in Cloud Environments: NoSQL and NewSQL Data Stores

    Advances in web technology and the proliferation of mobile devices and sensors connected to the Internet have resulted in immense processing and storage requirements. Cloud computing has emerged as a paradigm that promises to meet these requirements. This paper focuses on the storage aspect of cloud computing, specifically on data...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Service Selection in Web Service Compositions Optimizing Energy Consumption and Service Response Time

    A challenging task in web service composition is the runtime binding of a set of interconnected abstract services to concrete ones. This question, formulated as the service selection problem, has been studied in the area of service compositions implementing business processes. Despite the abundance of work on this topic, few...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Catching Modern Botnets Using Active Integrated Evidential Reasoning

    Botnets are now recognized as one of the major security threats to start various security attacks (e.g., spamming, DDoS). Although substantial research has been done towards botnet detection, it is becoming much more difficult today, especially for highly polymorphic, intelligent and stealthy modern botnets. Traditional botnet detection (e.g., signature, anomaly...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Agile Methods for Embedded Systems Development - A Literature Review and a Mapping Study

    There is a wide area of applications that use embedded systems, and the number of such systems keeps growing. The required functionality and complexity of embedded systems are also constantly increasing, and development of such products is becoming increasingly harder. This requires new thinking on the product development processes, and...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    An Elastic Virtual Infrastructure for Research Applications (ELVIRA)

    Cloud computing infrastructures provide a way for researchers to source the computational and storage resources they require to conduct their work and to collaborate within distributed research teams. The authors provide an overview of a cloud-based elastic virtual infrastructure for research applications that they have established to provide researchers with...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Towards Full Network Virtualization in Horizontal IaaS Federation: Security Issues

    Horizontal IaaS federation exploits datacenter for federation of IaaS provider by supplying virtual nodes (e.g. virtual machines, virtual switches, and virtual routers) and virtual links. Today's datacenters for cloud computing do not supply full network virtualization in terms of user-level network management and user-agreed network topology. The datacenters lack the...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Securing Cloud Using Third Party Threaded IDS

    Cloud computing is universal, staying anywhere in the world user can access the cloud applications. Mainly cloud computing will provide services to the users using Internet. Cloud storage services offer user-friendly, easily accessible and money-saving ways of storing and automatically backing up arbitrary data. These services are available on-demand on...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Efficient and Highly Portable Deterministic Multithreading (DetLock)

    In this paper, the authors present DetLock, a runtime system to ensure deterministic execution of multithreaded programs running on multicore systems. DetLock does not rely on any hardware support or kernel modification to ensure determinism. For tracking the progress of the threads, logical clocks are used. Unlike previous approaches, which...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    A Routing Framework for Energy Harvesting Wireless Nanosensor Networks in the Terahertz Band

    Wireless NanoSensor Networks (WNSNs) will allow novel intelligent nanomaterial-based sensors, or nanosensors, to detect new types of events at the nanoscale in a distributed fashion over extended areas. Two main characteristics are expected to guide the design of WNSNs architectures and protocols, namely, their Terahertz Band wireless communication and their...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    A Survey on Securing the Virtual Cloud

    In this paper, the authors present a survey and analysis of the current security measures implemented in cloud computing and the hypervisors that support it. The viability of an efficient virtualization layer has led to an explosive growth in the cloud computing industry, exemplified by Amazon's Elastic Cloud, Apple's iCloud,...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    AppaaS: Offering Mobile Applications as a Cloud Service

    With the huge number of offerings in the mobile application market, the choice of mobile applications that best fit particular objectives is challenging. Therefore, there is a demand for a platform elevating the momentum of mobile applications that can adapt their behavior according to the user's context. This paper proposes...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Efficient Parallel Spectral Clustering Algorithm Design for Large Data Sets Under Cloud Computing Environment

    Spectral clustering algorithm has proved be more effective than most traditional algorithms in finding clusters. However, its high computational complexity limits its effect in actual application. This paper combines the spectral clustering with MapReduce, through evaluation of sparse matrix Eigen-value and computation of distributed cluster, puts forward the improvement ideas...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Analytic Performance Modeling and Optimization of Live VM Migration

    Cloud computing is based on largely distributed virtual environments that provide Infrastructure-as-a-Service (IaaS) services to consumers allowing them to lease computing resources that scale to their needs. These services rely on virtualization as an important technology that facilitates dynamic resource management to meet Service Level Agreements (SLA) of disparate applications...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Linearly Homomorphic Structure-Preserving Signatures and their Applications

    Structure-Preserving Signatures (SPS) are signature schemes where messages, signatures and public keys all consist of elements of a group over which a bilinear map is efficiently computable. This property makes them useful in cryptographic protocols as they nicely compose with other algebraic tools (like the celebrated groth-sahai proof systems). In...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Efficient Cryptosystems from 2k-th Power Residue Symbols

    In this paper, the authors introduced a new generalization of the cryptosystem. The so-obtained cryptosystems are shown to be secure under the quadratic residuosity assumption. Further, they enjoy a number of useful features including fast decryption, optimal ciphertext expansion, and homomorphic property. The authors believe that their proposal is the...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    An Agents and Artifacts Approach to Distributed Data Mining

    In this paper the authors propose a novel Distributed Data Mining (DDM) approach based on the agents and artifacts paradigm, as implemented in CArtAgO, where artifacts encapsulate data mining tools, inherited from Weka, that agents can use while engaged in collaborative, distributed learning processes. Target hypothesis are currently constrained to...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data

    Suppose that a set of multiple users uploads in every time period encrypted values of some data. The considered problem is how an untrusted data aggregator can compute the sum of all users' values but nothing more. However, as advocated by the authors, the proposed encryption scheme suffers from some...

    Provided By Springer Healthcare

  • White Papers // Sep 2013

    Differentially Private Set-Valued Data Release Against Incremental Updates

    Publication of the private set-valued data will provide enormous opportunities for counting queries and various data mining tasks. Compared to those previous methods based on partition-based privacy models (e.g., k-anonymity), differential privacy provides strong privacy guarantees against adversaries with arbitrary background knowledge. However, the existing solutions based on differential privacy...

    Provided By Springer Healthcare

  • White Papers // Sep 2013

    Repairing Event Logs Using Timed Process Models

    Process mining aims to infer meaningful insights from process-related data and attracted the attention of practitioners, tool-vendors, and researchers in recent years. Traditionally, event logs are assumed to describe the as-is situation. But this is not necessarily the case in environments where logging may be compromised due to manual logging....

    Provided By Springer Healthcare

  • White Papers // Mar 2009

    A Protocol for Secure Remote Updates of FPGA Configurations

    The authors present a security protocol for the remote update of volatile FPGA configurations stored in non-volatile memory. Their approach can be implemented on existing FPGAs, as it sits entirely in user logic. Their protocol provides for remote attestation of the running configuration and the status of the upload process....

    Provided By Springer Healthcare

  • White Papers // Aug 2010

    A Case Study on Measuring Statistical Data in the Tor Anonymity Network

    The Tor network is one of the largest deployed anonymity networks, consisting of 1500+ volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its large user-base has made it attractive for researchers to analyze usage of a real deployed anonymity network. The recent growth of the network...

    Provided By Springer Healthcare

  • White Papers // Dec 2010

    CUDACS: Securing the Cloud With CUDA-Enabled Secure Virtualization

    While on the one hand unresolved security issues pose a barrier to the widespread adoption of cloud computing technologies, on the other hand the computing capabilities of even commodity HW are boosting, in particular thanks to the adoption of -core technologies. For instance, the Nvidia Compute Unified Device Architecture (CUDA)...

    Provided By Springer Healthcare

  • White Papers // Jun 2012

    Stochastic Modeling and Analysis Using QPME: Queueing Petri Net Modeling Environment V2.0

    Queueing Petri nets are a powerful formalism that can be exploited for modeling distributed systems and analyzing their performance and scalability. By combining the modeling power and expressiveness of queueing networks and stochastic Petri nets, queueing Petri nets provide a number of advantages. In this paper, the authors present their...

    Provided By Springer Healthcare

  • White Papers // May 2012

    Nudge: Intermediaries' Role in Interdependent Network Security

    By employing an interdependent security game-theoretic framework, the authors study how individual Internet Service Providers can coordinate the investment decisions of end users to improve the security and trustworthiness of the overall system. They discuss two different forms of intervention: rebates in combination with penalties (pay for outcome) and cost-subsidies...

    Provided By Springer Healthcare

  • White Papers // Oct 2012

    Capacity Maximization through Energy-Aware Multi-Mode Relaying

    In future wireless mobile networks, data rate and quality of service are expected to be comparable to those of wired deployments. To achieve this target, novel architectures must be adopted, successfully countering the disadvantages of the wireless transmission. Inspired by that, cooperative relaying was proposed because of the various gains...

    Provided By Springer Healthcare

  • White Papers // Jun 2012

    LISP-MN: Mobile Networking Through LISP

    The current internet architecture was not designed to easily accommodate mobility, because IP addresses are used both to identify and locate hosts. The Locator/Identifier Separation Protocol (LISP) decouples them by considering two types of addresses: EIDs that identify hosts, and RLOCs that identify network attachment points and are used as...

    Provided By Springer Healthcare

  • White Papers // Jun 2011

    Workflow Management for Soft Real-Time Interactive Applications in Virtualized Environments

    Many applications, especially the ones implementing multi-user collaborative environments, fall within the context of soft real-time systems in which only small deviations from timing constraints are allowed. The advancements in distributed computing have made it possible to follow a service oriented approach, taking advantage of the benefits this provides. In...

    Provided By Springer Healthcare

  • White Papers // Oct 2008

    1000 Islands: An Integrated Approach to Resource Management for Virtualized Data Centers

    Recent advances in hardware and software virtualization offer unprecedented management capabilities for the mapping of virtual resources to physical resources. It is highly desirable to further create a \"Service hosting abstraction\" that allows application owners to focus on Service Level Objectives (SLOs) for their applications. This calls for a resource...

    Provided By Springer Healthcare

  • White Papers // Sep 2012

    Open Innovation Practices in SMEs and Large Enterprises

    Few studies on Open Innovation (OI) address OI practices in Small and Medium-sized Enterprises (SMEs) and how their use of OI and the resulting benefits differ from those of large enterprises. The lack of resources in SMEs to engage in looking outward is said to be a barrier to OI,...

    Provided By Springer Healthcare

  • White Papers // Mar 2012

    Effectiveness and efficiency of SME innovation policy

    This paper assesses UK innovation policy impact on a large, population weighted, sample of both service and manufacturing SMEs. By focusing on self-reported innovation the study achieves a wider coverage of the effects of SME innovation policy than possible with more traditional indicators. Propensity score matching indicates that SMEs receiving...

    Provided By Springer Healthcare

  • White Papers // Aug 2012

    SME Takeovers as a Contributor to Regional Productivity Gaps

    New economic geography models typically predict centripetal economic development. One process by which this might be brought about is if large companies based in the core of the economy buy up and remove small dynamic enterprises from peripheral regions, thereby suppressing development outside the core. This hypothesis is investigated by...

    Provided By Springer Healthcare

  • White Papers // Jul 2009

    Improving Interactions in Knowledge Intensive Communities of Practices for SMEs

    Knowledge is a key to success also for Small and Medium sized Enterprises (SMEs) but many of them lack of understanding what they want to accomplish with a Knowledge Management (KM) environment and are not ready to implement/use it. In this paper, the authors first present the readiness of SMEs...

    Provided By Springer Healthcare

  • White Papers // Nov 2007

    Software Process Improvement in Small and Medium Software Enterprises: A Systematic Review

    Small and medium enterprises are a very important cog in the gears of the world economy. The software industry in most countries is composed of an industrial scheme that is made up mainly of small and medium software enterprises - SMEs. To strengthen these types of organizations, efficient Software Engineering...

    Provided By Springer Healthcare

  • White Papers // May 2007

    An Adaptive e-Commerce System Definition

    The emergence and growing popularity of electronic commerce and more specifically of catalogue-based sales, has made it a necessity to define flexible and adaptive e-commerce systems and architectures. The authors' work describes an e-commerce system that is suitable for small and medium enterprises, where several enterprises share a common e-commerce...

    Provided By Springer Healthcare

  • White Papers // Jul 2010

    Re-Architected Cloud Data Center Networks and Their Impact on the Future Internet

    Large-scale Internet Data Centers (DC) are empowering the new era of cloud computing, a still evolving paradigm that promises infinite capacity, no upfront commitment and pay-as-you-go service models. Ongoing research towards providing low-cost powerful utility computing facilities includes large-scale (geo)- distributed application programming, innovation in the infrastructure (e.g. energy management,...

    Provided By Springer Healthcare

  • White Papers // Oct 2010

    Determining the Position of a Jammer Using a Virtual-Force Iterative Approach

    Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource in different layers and to defend...

    Provided By Springer Healthcare

  • White Papers // May 2010

    InstantLeap: An Architecture for Fast Neighbor Discovery in Large-Scale P2P VoD Streaming

    In large-scale Peer-To-Peer (P2P) Video-on-Demand (VoD) streaming applications, a fundamental challenge is to quickly locate new supplying peers whenever a VCR command is issued, in order to achieve smooth viewing experiences. For many existing commercial systems which use tracker servers for neighbor discovery, the increasing scale of P2P VoD systems...

    Provided By Springer Healthcare

  • White Papers // Aug 2010

    Contributions of Tester Experience and a Checklist Guideline to the Identification of Categories and Choices for Software Testing

    An early step for most black-box testing methods is to identify a set of categories and choices (or their equivalents) from the specification. The identification is often performed in an ad hoc manner, thus the quality of categories and choices is in doubt. Poorly identified categories and choices will affect...

    Provided By Springer Healthcare

  • White Papers // Aug 2009

    Fault-Management in P2P-MPI

    The authors present in this paper a study on fault management in a grid middleware. The middleware is their home-grown software called P2P-MPI. This framework is MPJ compliant, allows users to execute message passing parallel programs, and its objective is to support environments using commodity hardware. Hence, running programs is...

    Provided By Springer Healthcare

  • White Papers // Jan 2010

    AEETC - Adaptive Energy-Efficient Timing Control in Wireless Networks With Network Coding

    Energy is a scarce resource in wireless networks. Network coding has been proposed recently as a means to reduce the number of transmissions and energy consumption. In this paper, the authors introduce timing control into network coding to further enhance its performance. It is found that when bandwidth is sufficient,...

    Provided By Springer Healthcare

  • White Papers // Apr 2009

    Rematch: A Highly Reliable Scheduling Algorithm on Heterogeneous Wireless Mesh Network

    In highly dynamic and heterogeneous Wireless Mesh Networks (WMN), link quality will seriously affect network performance. Two challenges hinder one from achieving a highly efficient WMN. One is the channel dynamics. As in real network deployment, channel qualities are changing over time, which would seriously affect network bandwidth and reliability....

    Provided By Springer Healthcare

  • White Papers // Oct 2010

    Design and Implementation of Mobile Sink Node in SDMA Applications

    Mobile nodes are used to solve the problems existing in static wireless sensor networks such as energy hole, overlapping and hot spot etc. Through data gathering and relaying, mobile nodes can reduce the amount of data transmitting between the static nodes, which can conserve the power of these nodes and...

    Provided By Springer Healthcare

  • White Papers // Jan 2012

    On the Performance of Energy-Division Multiple Access Over Fading Channels

    In this paper, the authors consider a multiple-access scheme in which different users share the same bandwidth and the same pulse, and are discriminated at the receiver on the basis of the received energy using successive decoding. More specifically, they extend the performance analysis from the case of additive white...

    Provided By Springer Healthcare

  • White Papers // Aug 2012

    A Reconfigurable Component Model With Semantic Type System for Dynamic WSN Applications

    Runtime reconfigurable component models provide several attractions with regard to the management of Wireless Sensor Network (WSN) applications operating in dynamic environments and under evolving application requirements. One such attraction is the runtime discovery of suitable components for reuse in changing application compositions. Syntactic interface typing, provided by contemporary component...

    Provided By Springer Healthcare

  • White Papers // Apr 2011

    Design of Embedded Database Based on Hybrid Storage of PRAM and NAND Flash Memory

    Android which is the popular smart phone OS uses a database system to manage its private data storage. Although the database system supports a powerful and light-weight database engine, its performance is limited by a single storage media, NAND flash memory, and a single file system, YAFFS2. In this paper,...

    Provided By Springer Healthcare

  • White Papers // Jun 2012

    Private Computation of Spatial and Temporal Power Consumption with Smart Meters

    Smart metering of utility consumption is rapidly becoming reality for multitudes of people and households. It promises real-time measurement and adjustment of power demand which is expected to result in lower overall energy use and better load balancing. On the other hand, finely granular measurements reported by smart meters can...

    Provided By Springer Healthcare

  • White Papers // Sep 2009

    Model-Free Probabilistic Localization of Wireless Sensor Network Nodes in Indoor Environments

    The authors present a technique that makes up a practical probabilistic approach for locating wireless sensor network devices using the commonly available signal strength measurements (RSSI). From the RSSI measurements between transmitters and receivers situated on a set of landmarks, they construct appropriate probabilistic descriptors associated with a device's position...

    Provided By Springer Healthcare

  • White Papers // Apr 2012

    A Survey of Computation Offloading for Mobile Systems

    Mobile systems have limited resources, such as battery life, network bandwidth, storage capacity, and processor performance. These restrictions may be alleviated by computation of f loading: sending heavy computation to resourceful servers and receiving the results from these servers. Many issues related to offloading have been investigated in the past...

    Provided By Springer Healthcare

  • White Papers // Sep 2012

    A Holistic Approach to Visualizing Business Models for The Internet of Things

    The Internet of Things (IoT) promises huge potential economic benefits. However, current IoT applications are in their infancy and the full potential of possible business opportunities is yet to be discovered. To help realize these economic benefits, workable business models are required that show where opportunities exist. In this paper,...

    Provided By Springer Healthcare

  • White Papers // Mar 2012

    Quality Assessment for Mobile Media-Enriched Services: Impact of Video Lengths

    The inclusion of multimedia content in different web-based services has increased significantly. Through an extensive subjective testing campaign, the authors analyze the quality of experience concerning video transmissions associated to these types of services when accessed from mobile devices and mobile Internet connections. Contrary to traditional normalized quality assessment studies,...

    Provided By Springer Healthcare

  • White Papers // Feb 2012

    Mobile Communication for Intellectually Challenged People: A Proposed Set of Requirements for Interface Design on Touch Screen Devices

    The use of certain applications for touch-based mobile devices can prove to be difficult for intellectually challenged people. By performing tests and gathering user feedback, great difficulty has been detected in the use of various applications due to their complicated interfaces. The authors propose a set of guidelines, aimed at...

    Provided By Springer Healthcare

  • White Papers // Dec 2012

    A Generative-Oriented Model-Driven Design Environment for Customizable Video Surveillance Systems

    To tackle the growing complexity and huge demand for tailored domestic video surveillance systems along with a high demanding time-to-market expectation, engineers at IVV Automacao, LDA are exploiting video surveillance domain as families of systems that can be developed following a pay-as-you-go fashion rather than developing an exnihilo new product....

    Provided By Springer Healthcare

  • White Papers // Dec 2012

    Accurate Energy Characterization of OS Services in Embedded Systems

    As technology scales for increased circuit density and performance, the management of power consumption in embedded systems is becoming critical. Because the Operating System (OS) is a basic component of the embedded system, the reduction and characterization of its energy consumption is a main challenge for the designers. In this...

    Provided By Springer Healthcare

  • White Papers // Dec 2012

    A Router for The Containment of Timing and Value Failures in CAN

    The dependability deficiencies and bandwidth constraints of the Controller Area Network (CAN) can prevent its use in safety-relevant and performance-demanding applications. This paper introduces mechanisms for fault detection and fault isolation based on an intelligent CAN router, which exploits a priori knowledge about the permitted behavior of attached Electronic Control...

    Provided By Springer Healthcare

  • White Papers // May 2012

    Implementation of a Reconfigurable ASIP for High Throughput Low Power DFT/DCT/FIR Engine

    In this paper, the authors present an ASIP design for a Discrete Fourier Transform (DFT)/Discrete Cosine Transform (DCT)/Finite Impulse Response filters (FIR) engine. The engine is intended for use in an accelerator-chain implementation of wireless communication systems. The engine offers a very high degree of flexibility, accepting and accelerating performance...

    Provided By Springer Healthcare

  • White Papers // May 2012

    Embedded Reconfigurable Synchronization & Acquisition ASIP for a Multi-Standard OFDM Receiver

    Embedded reconfigurable architectures are currently attracting increasing attention in the wireless communications industry due to the escalating number of wireless standards in today's market. Application Specific Instruction-set Processors (ASIPs) present a reconfigurable solution that offers a compromise between programmability and low power consumption. In this paper, the design and implementation...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Pseudorandom Recursions II

    The authors present their earlier results (not included in Hars and Petruska due to space and time limitations), as well as some updated versions of those, and a few more recent pseudorandom number generator designs. These tell a systems designer which computer word lengths are suitable for certain high-quality pseudorandom...

    Provided By Springer Healthcare

  • White Papers // Aug 2011

    PaderMAC: A Low-Power, Low-Latency MAC Layer with Opportunistic Forwarding Support for Wireless Sensor Networks

    Modern Medium Access Control (MAC) protocols for Wireless Sensor Networks (WSN) focus on energy-efficiency by switching a node's radio on only when necessary. This introduced rendezvous problem is gracefully handled by modern asynchronous approaches to WSN MAC's, e.g. X-MAC, using strobed preambles. Nevertheless, most MAC layer ignore the possible benefits...

    Provided By Springer Healthcare

  • White Papers // Aug 2011

    Revisiting Clustering Based Efficient Broadcast for Wireless Multihop Networks with Memory Limited Nodes

    The easiest way to broadcast a message in a wireless multi-hop network is to let each network node retransmit the broadcast message once it has received it. That way however many unnecessary redundant transmissions take place. A large body of literature exists which copes with the problem to keep the...

    Provided By Springer Healthcare