Springer Healthcare

Displaying 1-40 of 708 results

  • White Papers // Jun 2014

    A Comparative Study on Resource Allocation and Energy Efficient Job Scheduling Strategies in Large-Scale Parallel Computing Systems

    In the large-scale parallel computing environment, resource allocation and energy efficient techniques are required to deliver the Quality of Services (QoS) and to reduce the operational cost of the system. Because the cost of the energy consumption in the environment is a dominant part of the owner's and user's budget....

    Provided By Springer Healthcare

  • White Papers // Jun 2014

    A Survey and Taxonomy on Energy Efficient Resource Allocation Techniques for Cloud Computing Systems

    In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application (e.g., content delivery networks, MapReduce, web applications, and the like) workloads having contentious allocation requirements in terms of...

    Provided By Springer Healthcare

  • White Papers // Jun 2014

    Dual-Access Way-Prediction Cache for Embedded Systems

    Way-Prediction (WP) caches have advantages of reducing power consumption and latency for highly associative data caches and thus are favorable for embedded systems. In this paper, the authors propose an enhanced way-prediction cache, Dual-Access Way-Prediction (DAWP) cache, to cope with the weakness of the WP cache. The prediction logic designed...

    Provided By Springer Healthcare

  • White Papers // Apr 2014

    CubeLoad: A Parametric Generator of Realistic OLAP Workloads

    Differently from OLTP workloads, OLAP workloads are hardly predictable due to their inherently extemporary nature. Besides, obtaining real OLAP workloads by monitoring the queries actually issued in companies and organizations is quite hard. On the other hand, hardware and software benchmarking in the industrial world, as well as comparative evaluation...

    Provided By Springer Healthcare

  • White Papers // Apr 2014

    WABRM: A Work-Load Aware Balancing and Resource Management Framework for Swift on Cloud

    Fueled by increasing demand of big data processing, distributed storage systems have been more and more widely used by enterprises. However, in these systems, few storage nodes holding enormous amount of hotspot data could become bottlenecks. This stems from the fact that most typical distributed storage systems mainly provide data...

    Provided By Springer Healthcare

  • White Papers // Apr 2014

    An Overview of the Commercial Cloud Monitoring Tools: Research Dimensions, Design Issues, and State-of-the-Art

    Cloud monitoring activity involves dynamically tracking the Quality of Service (QoS) parameters related to virtualized resources (e.g., VM, storage, network, appliances, etc.), the physical resources they share, the applications running on them and data hosted on them. Applications and resources configuration in cloud computing environment is quite challenging considering a...

    Provided By Springer Healthcare

  • White Papers // Apr 2014

    Evaluation Methodology for Data Communication-Aware Application Partitioning

    Heterogeneous multicore architectures appear to be a promising solution to the ever-increasing computational demands of applications in embedded as well as high-performance computing domains. Nevertheless, inefficient application partitioning for such systems may result in a considerable reduction in the anticipated performance improvement. Consequently, proper mechanisms are required to evaluate quality...

    Provided By Springer Healthcare

  • White Papers // Mar 2014

    Hierarchical Approach to Optimization of Parallel Matrix Multiplication on Large-Scale Platforms

    Many state-of-the-art parallel algorithms, which are widely used in scientific applications executed on high-end computing systems, were designed in the twentieth century with relatively small-scale parallelism in mind. Indeed, while in 1990s a system with few hundred cores was considered a powerful supercomputer; modern top supercomputers have millions of cores....

    Provided By Springer Healthcare

  • White Papers // Feb 2014

    Unmixing-Based Content Retrieval System for Remotely Sensed Hyperspectral Imagery on GPUs

    In this paper the authors present a new unmixing-based retrieval system for remotely sensed hyperspectral imagery. The need for this kind of system is justified by the exponential growth in the volume and number of remotely sensed data sets from the surface of the earth. This is particularly the case...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    Measuring Precision of Modeled Behavior

    Conformance checking techniques compare observed behavior (i.e., event logs) with modeled behavior for a variety of reasons. For example, discrepancies between a normative process model and recorded behavior may point to fraud or inefficiencies. The resulting diagnostics can be used for auditing and compliance management. Conformance checking can also be...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    Transactional Support for Adaptive Indexing

    Adaptive indexing initializes and optimizes indexes incrementally, as a side effect of query processing. The goal is to achieve the benefits of indexes while hiding or minimizing the costs of index creation. However, index-optimizing side effects seem to turn read-only queries into update transactions that might, for example, create lock...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    ADLU: A Novel Anomaly Detection and Location-Attribution Algorithm for UWB Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics. Besides energy consumption considerations, security has emerged as an equally important aspect in their network design. This is because WSNs are vulnerable to various types of attacks and to node compromises,...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    DynTunKey: A Dynamic Distributed Group Key Tunneling Management Protocol for Heterogeneous Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are being used for many applications ranging from mobile target surveillance to intelligent home networking. Due to the sensitive nature of the data transmitted by these applications, appropriate protection mechanisms are needed to prevent attackers from exploiting the weaknesses of the radio links. In this paper,...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    Big Data: A Survey

    In this paper, the authors review the background and state-of-the-art of big data. They first introduce the general background of big data and review related technologies, such as could computing, Internet of Things, data centers, and Hadoop. They then focus on the four phases of the value chain of big...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    InterCloud RAIDer: A Do-It-Yourself Multi-Cloud Private Data Backup System

    In this paper, the authors introduce InterCloud RAIDer, which realizes a multi-cloud private data backup system by composing a data deduplication technique to reduce the overall storage overhead, erasure coding to achieve redundancy at low overhead, which is dispersed across multiple cloud services to realize fault-tolerance against individual service providers,...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    A Decision Framework for Placement of Applications in Clouds That Minimizes Their Carbon Footprint

    Cloud computing gives users much freedom on where they host their computation and storage. However, the CO2 emission of a job depends on the location and the energy efficiency of the data centers where it is run. The authors developed a decision framework that determines to move computation with accompanying...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    An Improved Task Assignment Scheme for Hadoop Running in the Clouds

    Now-a-days, data-intensive problems are so prevalent that numerous organizations in various industries have to face them in their business operation. It is often crucial for enterprises to have the capability of analyzing large volumes of data in an effective and timely manner. MapReduce and its open-source implementation Hadoop dramatically simplified...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Data Management in Cloud Environments: NoSQL and NewSQL Data Stores

    Advances in web technology and the proliferation of mobile devices and sensors connected to the Internet have resulted in immense processing and storage requirements. Cloud computing has emerged as a paradigm that promises to meet these requirements. This paper focuses on the storage aspect of cloud computing, specifically on data...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Service Selection in Web Service Compositions Optimizing Energy Consumption and Service Response Time

    A challenging task in web service composition is the runtime binding of a set of interconnected abstract services to concrete ones. This question, formulated as the service selection problem, has been studied in the area of service compositions implementing business processes. Despite the abundance of work on this topic, few...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Catching Modern Botnets Using Active Integrated Evidential Reasoning

    Botnets are now recognized as one of the major security threats to start various security attacks (e.g., spamming, DDoS). Although substantial research has been done towards botnet detection, it is becoming much more difficult today, especially for highly polymorphic, intelligent and stealthy modern botnets. Traditional botnet detection (e.g., signature, anomaly...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Agile Methods for Embedded Systems Development - A Literature Review and a Mapping Study

    There is a wide area of applications that use embedded systems, and the number of such systems keeps growing. The required functionality and complexity of embedded systems are also constantly increasing, and development of such products is becoming increasingly harder. This requires new thinking on the product development processes, and...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    An Elastic Virtual Infrastructure for Research Applications (ELVIRA)

    Cloud computing infrastructures provide a way for researchers to source the computational and storage resources they require to conduct their work and to collaborate within distributed research teams. The authors provide an overview of a cloud-based elastic virtual infrastructure for research applications that they have established to provide researchers with...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Towards Full Network Virtualization in Horizontal IaaS Federation: Security Issues

    Horizontal IaaS federation exploits datacenter for federation of IaaS provider by supplying virtual nodes (e.g. virtual machines, virtual switches, and virtual routers) and virtual links. Today's datacenters for cloud computing do not supply full network virtualization in terms of user-level network management and user-agreed network topology. The datacenters lack the...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Securing Cloud Using Third Party Threaded IDS

    Cloud computing is universal, staying anywhere in the world user can access the cloud applications. Mainly cloud computing will provide services to the users using Internet. Cloud storage services offer user-friendly, easily accessible and money-saving ways of storing and automatically backing up arbitrary data. These services are available on-demand on...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Efficient and Highly Portable Deterministic Multithreading (DetLock)

    In this paper, the authors present DetLock, a runtime system to ensure deterministic execution of multithreaded programs running on multicore systems. DetLock does not rely on any hardware support or kernel modification to ensure determinism. For tracking the progress of the threads, logical clocks are used. Unlike previous approaches, which...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    A Survey on Securing the Virtual Cloud

    In this paper, the authors present a survey and analysis of the current security measures implemented in cloud computing and the hypervisors that support it. The viability of an efficient virtualization layer has led to an explosive growth in the cloud computing industry, exemplified by Amazon's Elastic Cloud, Apple's iCloud,...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    AppaaS: Offering Mobile Applications as a Cloud Service

    With the huge number of offerings in the mobile application market, the choice of mobile applications that best fit particular objectives is challenging. Therefore, there is a demand for a platform elevating the momentum of mobile applications that can adapt their behavior according to the user's context. This paper proposes...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Efficient Parallel Spectral Clustering Algorithm Design for Large Data Sets Under Cloud Computing Environment

    Spectral clustering algorithm has proved be more effective than most traditional algorithms in finding clusters. However, its high computational complexity limits its effect in actual application. This paper combines the spectral clustering with MapReduce, through evaluation of sparse matrix Eigen-value and computation of distributed cluster, puts forward the improvement ideas...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Analytic Performance Modeling and Optimization of Live VM Migration

    Cloud computing is based on largely distributed virtual environments that provide Infrastructure-as-a-Service (IaaS) services to consumers allowing them to lease computing resources that scale to their needs. These services rely on virtualization as an important technology that facilitates dynamic resource management to meet Service Level Agreements (SLA) of disparate applications...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Linearly Homomorphic Structure-Preserving Signatures and their Applications

    Structure-Preserving Signatures (SPS) are signature schemes where messages, signatures and public keys all consist of elements of a group over which a bilinear map is efficiently computable. This property makes them useful in cryptographic protocols as they nicely compose with other algebraic tools (like the celebrated groth-sahai proof systems). In...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Efficient Cryptosystems from 2k-th Power Residue Symbols

    In this paper, the authors introduced a new generalization of the cryptosystem. The so-obtained cryptosystems are shown to be secure under the quadratic residuosity assumption. Further, they enjoy a number of useful features including fast decryption, optimal ciphertext expansion, and homomorphic property. The authors believe that their proposal is the...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    An Agents and Artifacts Approach to Distributed Data Mining

    In this paper the authors propose a novel Distributed Data Mining (DDM) approach based on the agents and artifacts paradigm, as implemented in CArtAgO, where artifacts encapsulate data mining tools, inherited from Weka, that agents can use while engaged in collaborative, distributed learning processes. Target hypothesis are currently constrained to...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data

    Suppose that a set of multiple users uploads in every time period encrypted values of some data. The considered problem is how an untrusted data aggregator can compute the sum of all users' values but nothing more. However, as advocated by the authors, the proposed encryption scheme suffers from some...

    Provided By Springer Healthcare

  • White Papers // Sep 2013

    Differentially Private Set-Valued Data Release Against Incremental Updates

    Publication of the private set-valued data will provide enormous opportunities for counting queries and various data mining tasks. Compared to those previous methods based on partition-based privacy models (e.g., k-anonymity), differential privacy provides strong privacy guarantees against adversaries with arbitrary background knowledge. However, the existing solutions based on differential privacy...

    Provided By Springer Healthcare

  • White Papers // Sep 2013

    Repairing Event Logs Using Timed Process Models

    Process mining aims to infer meaningful insights from process-related data and attracted the attention of practitioners, tool-vendors, and researchers in recent years. Traditionally, event logs are assumed to describe the as-is situation. But this is not necessarily the case in environments where logging may be compromised due to manual logging....

    Provided By Springer Healthcare

  • White Papers // Sep 2013

    Evaluating the Manageability of Web Browsers Controls

    The proliferation of Smartphone's has introduced new challenges in web browsing security. These devices often have limited resources and small size, which may limit the security 'Arsenal' of their user. This, however, does not seem to deter Smartphone users from accessing the Web via their devices. On the same time,...

    Provided By Springer Healthcare

  • White Papers // Sep 2013

    Access-Load-Aware Dynamic Data Balancing for Cloud Storage Service

    Cloud storage is the typical way for storing massive data in big data era. Dynamic data balancing is important for cloud storage since it aims to improve the utilization of computing resource and the performance of data process. However, storage-load-aware data balancing, adopted by almost all existing cloud storage services...

    Provided By Springer Healthcare

  • White Papers // Sep 2013

    Federated Authorization for Software-as-a-Service Applications

    Software-as-a-Service (SaaS) is a type of cloud computing in which a tenant rents access to a shared, typically web-based application hosted by a provider. Access control for SaaS should enable the tenant to control access to data that are located at the provider based on tenant-specific access control policies. To...

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    A UHF/UWB Hybrid Silicon RFID Tag With on - Chip Antennas

    In this paper, the authors describe and analyze a miniature wireless Radio Frequency IDentification (RFID) chip with On-Chip Antennas (OCA) and Ultra WideBand (UWB) signaling by real-world measurements. With the on-chip antenna approach, no external antennas are required, and the size of the overall tag is identical to the size...

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    Formal Analysis of Memory Contention in a Multiprocessor System

    Multi-core processors along with multi-module memories are extensively being used in high performance computers these days. One of the main performance evaluation metrics in such configurations is the memory contention problem and its effect on the overall memory access time. Usually, this problem is analyzed using simulation or numerical methods....

    Provided By Springer Healthcare

  • White Papers // Sep 2010

    Solving the Multi-Dimensional Multi-Choice Knapsack Problem With the Help of Ants

    In this paper, the authors have proposed two novel algorithms based on Ant Colony Optimization (ACO) for finding near-optimal solutions for the Multi-dimensional Multi-choice Knapsack Problem (MMKP). MMKP is a discrete optimization problem, which is a variant of the classical 0-1 Knapsack Problem and is also an NP-hard problem. Due...

    Provided By Springer Healthcare

  • White Papers // Aug 2012

    SHIELD: A Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-Radio Wireless Networks

    Due to users' fast-growing demands, wireless spectrum is becoming a more and more scarce resource. However, the state of spectrum usage shows that while large chunks of spectrum are left idle at many places, many emerging wireless applications cannot get enough spectrum to provide their services. In contrast to existing...

    Provided By Springer Healthcare

  • White Papers // Aug 2012

    AMPLE: A Novel Incentive Approach to Adaptive-Width Channel Allocation in Multi-Hop, Non-Cooperative Wireless Networks

    Due to the limitation of radio spectrum resource and fast deployment of wireless devices, careful channel allocation is of great importance for mitigating the performance degradation caused by interference among different users in wireless networks. Most of existing work focused on fixed-width channel allocation. However, latest researches have demonstrated that...

    Provided By Springer Healthcare

  • White Papers // Aug 2012

    Exploiting Spectrum Spatial Reusability for Routing in Multi-Hop Wireless Networks

    Routing metrics are essential to achieve a good end-to-end throughput on a min-cost path in multi-hop wireless networks. Originally, most routing algorithms were based on min-hop count metric. Then link-quality aware metrics, ETX and ETT, are proposed. After that, the emergence of opportunistic and any-path routing, leads to metrics such...

    Provided By Springer Healthcare

  • White Papers // Jun 2011

    A Chaotic Encryption Scheme for Real-Time Embedded Systems: Design and Implementation

    Chaotic encryption schemes are believed to provide greater level of security than conventional ciphers. In this paper, a chaotic stream cipher is first constructed and then its hardware implementation details over Xilinx Virtex- 6 FPGA are provided. Logistic map is the simplest chaotic system and has high potential to be...

    Provided By Springer Healthcare

  • White Papers // Dec 2011

    Fault-Tolerant Relay Deployment Based on Length-Constrained Connectivity and Rerouting Centrality in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are prone to failures. To be robust to failures, the network topology should provide alternative routes to the sinks so when failures occur the routing protocol can still offer reliable delivery. The authors define l-CRC, a new centrality index which measures a node's importance to connectivity...

    Provided By Springer Healthcare

  • White Papers // Sep 2011

    Snapshot Centrality Indices in Dynamic FIFO Networks

    The paper introduces the concept of snapshot dynamic indices as centrality measures to analyze how the importance of nodes changes over time in dynamic networks. In particular, the dynamic stress-snapshot and dynamic betweenness snapshot are investigated. The authors present theoretical results on dynamic shortest paths in first-in first-out dynamic networks,...

    Provided By Springer Healthcare

  • White Papers // Jul 2011

    A Survey of Visual Sensor Network Platforms

    Recent developments in low-cost CMOS cameras have created the opportunity of bringing imaging capabilities to sensor networks. Various visual sensor platforms have been developed with the aim of integrating visual data to wireless sensor applications. This paper is to survey current visual sensor platforms according to in-network processing and compression/coding...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Energy-Efficient Thermal-Aware Autonomic Management of Virtualized HPC Cloud Infrastructure

    Virtualized datacenters and clouds are being increasingly considered for traditional High-Performance Computing (HPC) workloads that have typically targeted Grids and conventional HPC platforms. However, maximizing energy efficiency and utilization of datacenter resources, and minimizing undesired thermal behavior while ensuring application performance and other Quality of Service (QoS) guarantees for HPC...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Performance Analysis of Analog Network Coding Based Two-Way Amplify-and-Forward System in Mixed Rician and Nakagami-m Fading Environment

    This paper presents the performance analysis of analog network coding-based two-way amplify-and-forward relaying under mixed Rician and Nakagami-m fading environment. Closed form expressions for both the cumulative distribution function and probability distribution function of the instantaneous end-to-end SNR are derived. Using those, the closed form expressions for the first moment,...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Handoff Management in Communication-Based Train Control Networks Using Stream Control Transmission Protocol and IEEE 802.11p WLANs

    Communication-Based Train Control (CBTC) network is an automated control network for railways that ensures the safe operation of rail vehicles using data communications. CBTC networks have stringent requirements for communication availability and latency. Wireless Local Area Network (WLAN) is a popular choice in CBTC networks due to the available commercial-off-the-shelf...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Systematic Raptor Codes for Safety Broadcast in an Unsaturated Vehicular Highway Environment

    Active safety broadcast is one of the most fundamental services in intelligent transportation systems. The repetition code proposed in Wireless Access for Vehicular Environment (WAVE) standard is inefficient in realistic channel conditions and rapidly changing network topologies. In this paper, the authors propose the use of systematic raptor codes as...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Performance Evaluation of Multiple-Antenna IEEE 802.11p Transceivers Using an FPGA-Based MIMO Vehicular Channel Emulator

    The IEEE 802.11p standard has been optimized for low-delay small-bandwidth wireless communications to provide vehicular safety services. However, IEEE 802.11p transceivers can considerably improve their robustness by incorporating MIMO transmission methods. Moreover, multiple antennas can also be used to increase the data transfer rate of IEEE 802.11p transceivers, a requirement...

    Provided By Springer Healthcare

  • White Papers // Mar 2010

    A Novel Frequency Planning for Femtocells in OFDMA-Based Cellular Networks Using Fractional Frequency Reuse

    Femtocells are expected to be one of the emerging technologies for next generation communication systems. For successful deployment of femtocells in the pre-existing macrocell networks, there are some challenges such as the cell planning for interference management, handoff, and power control. In this paper, the authors focus on frequency planning...

    Provided By Springer Healthcare

  • White Papers // Nov 2011

    Resource Allocation With Partitioning Criterion for Macro-Femto Overlay Cellular Networks With Fractional Frequency Reuse

    The interference mitigation technique based on Fractional Frequency Reuse (FFR) provides improved cell-edge performance with similar overall cell capacity as that of systems with the frequency reuse factor of one. Furthermore, frequency sub-band allocation by FFR has the benefit of allowing flexibility for the deployment of femto-cells through frequency partitioning....

    Provided By Springer Healthcare

  • White Papers // Sep 2011

    Algorithmic Aspects of Risk Management

    Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In contrast, the authors use risk computation to drive changes in an operating system's security configuration. This allows risk management to occur in...

    Provided By Springer Healthcare

  • White Papers // Feb 2012

    Selections: Internet Voting With Over-the Shoulder Coercion-Resistance

    The present Selections, a new cryptographic voting protocol that is end-to-end verifiable and suitable for Internet voting. After a one-time in-person registration, voters can cast ballots in an arbitrary number of elections. The authors say a system provides over-the-shoulder coercion resistance if a voter can undetectably avoid complying with an...

    Provided By Springer Healthcare

  • White Papers // Mar 2010

    A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search

    For nearest neighbor search, a user queries a server for nearby Points Of Interest (POIs) with his/her location information. The authors' aim is to protect the user's sensitive information against adversaries including the location-based service itself. Most research efforts have elaborated on reasonable trade-offs between privacy and utility. Their propose...

    Provided By Springer Healthcare

  • White Papers // Mar 2009

    A Protocol for Secure Remote Updates of FPGA Configurations

    The authors present a security protocol for the remote update of volatile FPGA configurations stored in non-volatile memory. Their approach can be implemented on existing FPGAs, as it sits entirely in user logic. Their protocol provides for remote attestation of the running configuration and the status of the upload process....

    Provided By Springer Healthcare

  • White Papers // Aug 2010

    A Case Study on Measuring Statistical Data in the Tor Anonymity Network

    The Tor network is one of the largest deployed anonymity networks, consisting of 1500+ volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its large user-base has made it attractive for researchers to analyze usage of a real deployed anonymity network. The recent growth of the network...

    Provided By Springer Healthcare

  • White Papers // Oct 2008

    Byzantine Consensus With Unknown Participants

    Consensus is a fundamental building block used to solve many practical problems that appear on reliable distributed systems. In spite of the fact that consensus is being widely studied in the context of classical networks, few studies have been conducted in order to solve it in the context of dynamic...

    Provided By Springer Healthcare

  • White Papers // Dec 2010

    CUDACS: Securing the Cloud With CUDA-Enabled Secure Virtualization

    While on the one hand unresolved security issues pose a barrier to the widespread adoption of cloud computing technologies, on the other hand the computing capabilities of even commodity HW are boosting, in particular thanks to the adoption of -core technologies. For instance, the Nvidia Compute Unified Device Architecture (CUDA)...

    Provided By Springer Healthcare

  • White Papers // Jun 2012

    Stochastic Modeling and Analysis Using QPME: Queueing Petri Net Modeling Environment V2.0

    Queueing Petri nets are a powerful formalism that can be exploited for modeling distributed systems and analyzing their performance and scalability. By combining the modeling power and expressiveness of queueing networks and stochastic Petri nets, queueing Petri nets provide a number of advantages. In this paper, the authors present their...

    Provided By Springer Healthcare

  • White Papers // May 2012

    Nudge: Intermediaries' Role in Interdependent Network Security

    By employing an interdependent security game-theoretic framework, the authors study how individual Internet Service Providers can coordinate the investment decisions of end users to improve the security and trustworthiness of the overall system. They discuss two different forms of intervention: rebates in combination with penalties (pay for outcome) and cost-subsidies...

    Provided By Springer Healthcare

  • White Papers // Aug 2008

    Application of Data Mining to Network Intrusion Detection: Classifier Selection Model

    As network attacks have increased in number and severity over the past few years, Intrusion Detection System (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS...

    Provided By Springer Healthcare

  • White Papers // Oct 2012

    Capacity Maximization through Energy-Aware Multi-Mode Relaying

    In future wireless mobile networks, data rate and quality of service are expected to be comparable to those of wired deployments. To achieve this target, novel architectures must be adopted, successfully countering the disadvantages of the wireless transmission. Inspired by that, cooperative relaying was proposed because of the various gains...

    Provided By Springer Healthcare

  • White Papers // Jun 2012

    LISP-MN: Mobile Networking Through LISP

    The current internet architecture was not designed to easily accommodate mobility, because IP addresses are used both to identify and locate hosts. The Locator/Identifier Separation Protocol (LISP) decouples them by considering two types of addresses: EIDs that identify hosts, and RLOCs that identify network attachment points and are used as...

    Provided By Springer Healthcare

  • White Papers // Sep 2011

    Delay Analysis of Wireless Broadband Networks with Non Real-Time Traffic

    In this paper, the authors present the analysis of the mean overall packet delay of non real-time traffic in IEEE 802.16-based wireless broadband networks. They consider the case of contention-based bandwidth reservation. The system model accounts for both bandwidth reservation and packet transmission delay components of the overall delay. The...

    Provided By Springer Healthcare

  • White Papers // Aug 2011

    Complexity Analysis of Adaptive Binary Arithmetic Coding Software Implementations

    This paper is dedicated to the complexity comparison of adaptive binary arithmetic coding integer software implementations. Firstly, for binary memoryless sources with known probability distribution, the authors prove that encoding time for arithmetic encoder is a linear function of a number of input binary symbols and source entropy. Secondly, they...

    Provided By Springer Healthcare

  • White Papers // Jun 2011

    A Practical Tree Algorithm With Successive Interference Cancellation for Delay Reduction in IEEE 802.16 Networks

    This paper thoroughly studies a modification of tree algorithm with successive interference cancellation. In particular, the authors focus on the algorithm throughput and account for a single signal memory location, as well as cancellation errors of three types. The resulting scheme is robust to imperfect interference cancellation and is tailored...

    Provided By Springer Healthcare

  • White Papers // Jun 2010

    Upper Bound on Overall Delay in Wireless Broadband Networks With Non Real-Time Traffic

    IEEE 802.16 telecommunication protocol defined by the respective networking standard specifies a high data rate wireless broadband network with inherent support for various multimedia applications. Media Access Control (MAC) layer of IEEE 802.16 provides unified service for the set of physical (PHY) layer profiles, each of which corresponds to a...

    Provided By Springer Healthcare

  • White Papers // Jun 2009

    Overall Delay in IEEE 802.16 With Contention-Based Random Access

    In this paper, the authors address the overall message delay analysis of IEEE 802.16 wireless metropolitan area network with contention-based multiple access of bandwidth requests. The overall delay consists of the reservation and scheduling components. Broadcast polling is used for bandwidth reservation with Binary Exponential Backoff (BEB) collision resolution protocol...

    Provided By Springer Healthcare

  • White Papers // Sep 2009

    Video Compression for Wireless Transmission: Reducing the Power Consumption of the WPAN Hi-Speed Systems

    Video transmission in Wireless Personal Area Networks (WPAN) has become a hot topic in the modern industry. The ability to use 60GHz spectrum led to new communication standards development to cover short range video delivery tasks. The standards like WirelessHD, IEEE 802.15.3c and NGmS (Next Generation millimeter-wave Systems) are designed...

    Provided By Springer Healthcare

  • White Papers // Sep 2008

    SICTA Modifications With Single Memory Location and Resistant to Cancellation Errors

    In this paper, the authors consider a cross-layer MAC-PHY technique that combines the collision resolution Tree Algorithm (TA) with the possibility of Successive Interference Cancellation (SIC). The overview of the previous work shows that no simple protocol has been proposed to use a single memory location for the captured signal....

    Provided By Springer Healthcare

  • White Papers // Jun 2011

    A TD-LTE Prototype System With Modules for General-Purpose Cognitive Resource Management and Radio-Environmental Mapping

    In this paper, the authors describe a demonstrator that shows how the Cognitive Resource Manager (CRM) and the Radio-Environmental Map (REM) can be efficiently implemented in full commercial grade cellular system (i.e., LTE system). The demonstrator shows how the modular CRM together with its open interface, the Universal Link-Layer API...

    Provided By Springer Healthcare

  • White Papers // Apr 2012

    Understanding Link Behavior of Non-Intrusive Wireless Body Sensor Networks

    The wireless Body Sensor Network (BSN) is used to detect and transmit physiological data such as vital signs by using radio wave communication. It offers a large saving potential for future healthcare applications because hospitalization of patients with chronic diseases can be kept at a minimum. The radio wave communication...

    Provided By Springer Healthcare

  • White Papers // Apr 2011

    Secure Localization With Attack Detection in Wireless Sensor Networks

    Rapid technological advances have enabled the development of low-cost sensor networks for various monitoring tasks, where it is important to estimate the positions of a number of regular sensor nodes whose locations cannot be known a priori. The authors address the problem of localizing the regular nodes with range-based location...

    Provided By Springer Healthcare

  • White Papers // Oct 2011

    The Probability Model of Peer-to-Peer Botnet Propagation

    Active peer-to-peer worms are great threat to the network security since they can propagate in automated ways and flood the Internet within a very short duration. Modeling a propagation process can help one to devise effective strategies against a worm's spread. This paper presents a study on modeling a worm's...

    Provided By Springer Healthcare

  • White Papers // Apr 2009

    Defending Against the Propagation of Active Worms

    Active worms propagate across networks by employing the various target discovery techniques. The significance of target discovery techniques in shaping a worm's propagation characteristics is derived from the life cycle of a worm. The various target discovery techniques that could be employed by active worms are discussed. It is anticipated...

    Provided By Springer Healthcare

  • White Papers // Nov 2008

    Large-Scale Network Intrusion Detection Based on Distributed Learning Algorithm

    As network traffic bandwidth is increasing at an exponential rate, it's impossible to keep up with the speed of networks by just increasing the speed of processors. Besides, increasingly complex intrusion detection methods only add further to the pressure on Network Intrusion Detection System (NIDS) platforms, so the continuous increasing...

    Provided By Springer Healthcare