Springer Healthcare

Displaying 1-40 of 451 results

  • White Papers // Mar 2014

    Hierarchical Approach to Optimization of Parallel Matrix Multiplication on Large-Scale Platforms

    Many state-of-the-art parallel algorithms, which are widely used in scientific applications executed on high-end computing systems, were designed in the twentieth century with relatively small-scale parallelism in mind. Indeed, while in 1990s a system with few hundred cores was considered a powerful supercomputer; modern top supercomputers have millions of cores....

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    DynTunKey: A Dynamic Distributed Group Key Tunneling Management Protocol for Heterogeneous Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are being used for many applications ranging from mobile target surveillance to intelligent home networking. Due to the sensitive nature of the data transmitted by these applications, appropriate protection mechanisms are needed to prevent attackers from exploiting the weaknesses of the radio links. In this paper,...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    ADLU: A Novel Anomaly Detection and Location-Attribution Algorithm for UWB Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics. Besides energy consumption considerations, security has emerged as an equally important aspect in their network design. This is because WSNs are vulnerable to various types of attacks and to node compromises,...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    A Decision Framework for Placement of Applications in Clouds That Minimizes Their Carbon Footprint

    Cloud computing gives users much freedom on where they host their computation and storage. However, the CO2 emission of a job depends on the location and the energy efficiency of the data centers where it is run. The authors developed a decision framework that determines to move computation with accompanying...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    An Improved Task Assignment Scheme for Hadoop Running in the Clouds

    Now-a-days, data-intensive problems are so prevalent that numerous organizations in various industries have to face them in their business operation. It is often crucial for enterprises to have the capability of analyzing large volumes of data in an effective and timely manner. MapReduce and its open-source implementation Hadoop dramatically simplified...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Data Management in Cloud Environments: NoSQL and NewSQL Data Stores

    Advances in web technology and the proliferation of mobile devices and sensors connected to the Internet have resulted in immense processing and storage requirements. Cloud computing has emerged as a paradigm that promises to meet these requirements. This paper focuses on the storage aspect of cloud computing, specifically on data...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Service Selection in Web Service Compositions Optimizing Energy Consumption and Service Response Time

    A challenging task in web service composition is the runtime binding of a set of interconnected abstract services to concrete ones. This question, formulated as the service selection problem, has been studied in the area of service compositions implementing business processes. Despite the abundance of work on this topic, few...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Catching Modern Botnets Using Active Integrated Evidential Reasoning

    Botnets are now recognized as one of the major security threats to start various security attacks (e.g., spamming, DDoS). Although substantial research has been done towards botnet detection, it is becoming much more difficult today, especially for highly polymorphic, intelligent and stealthy modern botnets. Traditional botnet detection (e.g., signature, anomaly...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    An Elastic Virtual Infrastructure for Research Applications (ELVIRA)

    Cloud computing infrastructures provide a way for researchers to source the computational and storage resources they require to conduct their work and to collaborate within distributed research teams. The authors provide an overview of a cloud-based elastic virtual infrastructure for research applications that they have established to provide researchers with...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Towards Full Network Virtualization in Horizontal IaaS Federation: Security Issues

    Horizontal IaaS federation exploits datacenter for federation of IaaS provider by supplying virtual nodes (e.g. virtual machines, virtual switches, and virtual routers) and virtual links. Today's datacenters for cloud computing do not supply full network virtualization in terms of user-level network management and user-agreed network topology. The datacenters lack the...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Securing Cloud Using Third Party Threaded IDS

    Cloud computing is universal, staying anywhere in the world user can access the cloud applications. Mainly cloud computing will provide services to the users using Internet. Cloud storage services offer user-friendly, easily accessible and money-saving ways of storing and automatically backing up arbitrary data. These services are available on-demand on...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    A Survey on Securing the Virtual Cloud

    In this paper, the authors present a survey and analysis of the current security measures implemented in cloud computing and the hypervisors that support it. The viability of an efficient virtualization layer has led to an explosive growth in the cloud computing industry, exemplified by Amazon's Elastic Cloud, Apple's iCloud,...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    AppaaS: Offering Mobile Applications as a Cloud Service

    With the huge number of offerings in the mobile application market, the choice of mobile applications that best fit particular objectives is challenging. Therefore, there is a demand for a platform elevating the momentum of mobile applications that can adapt their behavior according to the user's context. This paper proposes...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Efficient Parallel Spectral Clustering Algorithm Design for Large Data Sets Under Cloud Computing Environment

    Spectral clustering algorithm has proved be more effective than most traditional algorithms in finding clusters. However, its high computational complexity limits its effect in actual application. This paper combines the spectral clustering with MapReduce, through evaluation of sparse matrix Eigen-value and computation of distributed cluster, puts forward the improvement ideas...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Analytic Performance Modeling and Optimization of Live VM Migration

    Cloud computing is based on largely distributed virtual environments that provide Infrastructure-as-a-Service (IaaS) services to consumers allowing them to lease computing resources that scale to their needs. These services rely on virtualization as an important technology that facilitates dynamic resource management to meet Service Level Agreements (SLA) of disparate applications...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Linearly Homomorphic Structure-Preserving Signatures and their Applications

    Structure-Preserving Signatures (SPS) are signature schemes where messages, signatures and public keys all consist of elements of a group over which a bilinear map is efficiently computable. This property makes them useful in cryptographic protocols as they nicely compose with other algebraic tools (like the celebrated groth-sahai proof systems). In...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Efficient Cryptosystems from 2k-th Power Residue Symbols

    In this paper, the authors introduced a new generalization of the cryptosystem. The so-obtained cryptosystems are shown to be secure under the quadratic residuosity assumption. Further, they enjoy a number of useful features including fast decryption, optimal ciphertext expansion, and homomorphic property. The authors believe that their proposal is the...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data

    Suppose that a set of multiple users uploads in every time period encrypted values of some data. The considered problem is how an untrusted data aggregator can compute the sum of all users' values but nothing more. However, as advocated by the authors, the proposed encryption scheme suffers from some...

    Provided By Springer Healthcare

  • White Papers // Sep 2013

    Evaluating the Manageability of Web Browsers Controls

    The proliferation of Smartphone's has introduced new challenges in web browsing security. These devices often have limited resources and small size, which may limit the security 'Arsenal' of their user. This, however, does not seem to deter Smartphone users from accessing the Web via their devices. On the same time,...

    Provided By Springer Healthcare

  • White Papers // Sep 2013

    Federated Authorization for Software-as-a-Service Applications

    Software-as-a-Service (SaaS) is a type of cloud computing in which a tenant rents access to a shared, typically web-based application hosted by a provider. Access control for SaaS should enable the tenant to control access to data that are located at the provider based on tenant-specific access control policies. To...

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    Trend Mining in Dynamic Attributed Graphs

    Many applications see huge demands of discovering important patterns in dynamic attributed graph. In this paper, the authors introduce the problem of discovering trend sub-graphs in dynamic attributed graphs. This new kind of pattern relies on the graph structure and the temporal evolution of the attribute values. Several interestingness measures...

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    Towards Cross-Layer Monitoring of Multi-Cloud Service-Based Applications

    Cloud computing is becoming a popular platform to deliver Service-Based Applications (SBAs) based on Service-Oriented Architecture (SOA) principles. Monitoring the performance and functionality of SBAs deployed on multiple cloud providers (in what is also known as multi-cloud setup) and adapting them to variations/events produced by several layers (infrastructure, platform, application,...

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    HybridPlan: A Capacity Planning Technique for Projecting Storage Requirements in Hybrid Storage Systems

    Economic forces, driven by the desire to introduce flash into the high-end storage market without changing existing software-base, have resulted in the emergence of Solid-State Drives (SSDs), flash packaged in HDD form factors and capable of working with device drivers and I/O buses designed for HDDs. Unlike the use of...

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    Service Models and Pricing Schemes for Cloud Computing

    Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. To ensure large-scale adoption of cloud computing by businesses, several challenges including security, privacy, trust, performance and other quality attributes need to be addressed. Also, as with other utility services, adequate...

    Provided By Springer Healthcare

  • White Papers // Jul 2013

    Why Are Business Processes Not Secure?

    Security is simple to understand but hard to ensure. In the times of Internet, this task has been becoming harder every day. To date, computer science has not solved how to prevent the misuse of business processes. While data objects can be protected, a process cannot. The reason is the...

    Provided By Springer Healthcare

  • White Papers // Jul 2013

    A DDS-Based Middleware for Scalable Tracking, Communication and Collaboration of Mobile Nodes

    Applications such as transportation management and logistics, emergency response, environmental monitoring and mobile workforce management employ mobile networks as a means of enabling communication and coordination among a possibly very large set of mobile nodes. The majority of those systems may thus require real-time tracking of the nodes and interaction...

    Provided By Springer Healthcare

  • White Papers // Jul 2013

    Honey, I Shrunk the Cube

    Information flooding may occur during an OLAP session when the user drills down her cube up to a very fine-grained level, because the huge number of facts returned makes it very hard to analyze them using a pivot table. To overcome this problem the authors propose a novel OLAP operation,...

    Provided By Springer Healthcare

  • White Papers // Jul 2013

    RODD: An Effective Reference-Based Outlier Detection Technique for Large Datasets

    Outlier detection has gained considerable interest in several fields of research including various sciences, medical diagnosis, fraud detection, and network intrusion detection. Most existing techniques are either distance based or density based. In this paper, the authors present an effective Reference point based Outlier Detection for Large Datasets technique (RODD)...

    Provided By Springer Healthcare

  • White Papers // Jul 2013

    Heterogeneous Resource Federation With a Centralized Security Model for Information Extraction

    With the continuous growth of data generated in various scientific and commercial endeavors and the rising need for interdisciplinary studies and applications in e-Science easy exchange of information and computation resources capable of processing large amounts of data to allow ad-hoc co-operation becomes ever more important. Unfortunately different communities often...

    Provided By Springer Healthcare

  • White Papers // Jun 2013

    Measurement Study on P2P Streaming Systems

    Originally used as the default infrastructure for efficient file sharing, Peer-To-Peer (P2P) architecture achieved great successes. Now, the P2P model has been adopted for many other distributed applications, such as instant message and phone services, Internet gaming, and large-scale scientific computing. In recent years, P2P streaming systems experienced tremendous growth...

    Provided By Springer Healthcare

  • White Papers // Jun 2013

    GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits

    Secure two-party computation is a rapidly emerging field of research and enables a large variety of privacy-preserving applications such as mobile social networks or biometric identification. In the late eighties, two different approaches were proposed: Yao's garbled circuits and the protocol of Goldreich-Micali-Wigderson (GMW). Since then, research has mostly focused...

    Provided By Springer Healthcare

  • White Papers // Jun 2013

    RRG: Redundancy Reduced Gossip Protocol for Real-Time N-to-N Dynamic Group Communication

    Real-time group communication is an indispensable part of many interactive multimedia applications over the internet. In scenarios that involve large group sizes, sporadic sources, high user churns, and random network failures, gossip-based protocols can potentially provide advantages over structure-based group communication algorithms in ease of deployment, scalability, and resiliency against...

    Provided By Springer Healthcare

  • White Papers // Jun 2013

    KAMU: Providing Advanced User Privacy in Kerberos Multi-Domain Scenarios

    In next generation networks, Kerberos is becoming a key component to support authentication and key distribution for Internet application services. However, for this purpose, Kerberos needs to rectify certain deficiencies, especially in the area of privacy, which allow an eavesdropper to obtain information of the services users are accessing. This...

    Provided By Springer Healthcare

  • White Papers // Jun 2013

    Information Mining Processes Based on Intelligent Systems

    Business Intelligence offers an interdisciplinary approach (within which is Information Systems), that taking all available information resources and using of analytical and synthesis tools with the ability to transform information into knowledge, focuses on generating knowledge that contributes to the management decision-making and generation of strategic plans in organizations. Information...

    Provided By Springer Healthcare

  • White Papers // May 2013

    Fast VMM-Based Overlay Networking for Bridging the Cloud and High Performance Computing

    A collection of Virtual Machines (VMs) interconnected with an overlay network with a layer 2 abstraction has proven to be a powerful, unifying abstraction for adaptive distributed and parallel computing on loosely-coupled environments. It is now feasible to allow VMs hosting High Performance Computing (HPC) applications to seamlessly bridge distributed...

    Provided By Springer Healthcare

  • White Papers // May 2013

    Styles in Business Process Modeling: An Exploration and A Model

    Business process models are an important means to design, analyze, implement, and control business processes. As with every type of conceptual model, a business process model has to meet certain syntactic, semantic, and pragmatic quality requirements to be of value. For many years, such quality aspects were investigated by centering...

    Provided By Springer Healthcare

  • White Papers // May 2013

    Hierarchical and Multiple Switching NoC with Floorplan Based Adaptability

    The Networks-on-Chip (NoC) paradigm has been seen as an interconnect architecture solution for complex systems. However, performance and energy issues still represent limiting factors for Multi-Processors System-on-Chip (MPSoC). Moreover, the execution of different applications requires flexible and transparent interconnection solutions, and this feature is best provided by a self-adaptable system....

    Provided By Springer Healthcare

  • White Papers // May 2013

    ASAWA: An Automatic Partition Key Selection Strategy

    With the rapid increase of data volume, more and more applications have to be implemented in a distributed environment. In order to obtain high performance, the authors need to carefully divide the whole dataset into multiple partitions and put them into distributed data nodes. During this process, the selection of...

    Provided By Springer Healthcare

  • White Papers // May 2013

    Flood Modelling for Cities Using Cloud Computing

    Urban flood risk modeling is a highly topical example of intensive computational processing. Such processing is increasingly required by a range of organizations including local government, engineering consultancies and the insurance industry to fulfill statutory requirements and provide professional services. As the demands for this type of work become more...

    Provided By Springer Healthcare

  • White Papers // May 2013

    Contributory Provision Point Contracts - A Risk-Free Mechanism for Hedging Cloud Energy Costs

    Cloud computing services rely on electricity to power compute-servers, network equipment, cooling systems, and other supporting infrastructure. As such, energy costs are a substantial outgoing to public providers of cloud computing services. On-demand pricing, where consumers are not required to give advance notice of requirements, does not aid the provider...

    Provided By Springer Healthcare

  • White Papers // Jun 2007

    Memory-Constrained Block Processing for DSP Software Optimization

    Indefinite- or unbounded-length streams of input data characterize most applications in the Digital Signal Processing (DSP) and communications domains. As the complexity of DSP applications grows rapidly, great demands are placed on embedded processors to perform more and more intensive computations on these data streams. The multi-dimensional requirements that are...

    Provided By Springer Healthcare

  • White Papers // Dec 2009

    Exploiting Statically Schedulable Regions in Dataflow Programs

    Dataflow-based programming is employed in a wide variety of commercial and research-oriented tools related to DSP system design. Synchronous DataFlow (SDF) is a specialized form of dataflow that is streamlined for efficient representation of DSP systems. Dataflow descriptions have been used in a wide range of Digital Signal Processing (DSP)...

    Provided By Springer Healthcare

  • White Papers // May 2012

    Performance Characterization of Data-Intensive Kernels on AMD Fusion Architectures

    The cost of data movement over the PCI Express bus is one of the biggest performance bottlenecks for accelerating data-intensive applications on traditional discrete GPU architectures. To address this bottleneck, AMD Fusion introduces a fused architecture that tightly integrates the CPU and GPU onto the same die and connects them...

    Provided By Springer Healthcare

  • White Papers // Feb 2008

    Generalized Parallel-Server Fork-Join Queues With Dynamic Task Scheduling

    This paper introduces a generalization of the classical parallel-server fork-join queueing system in which arriving customers fork into multiple tasks, every task is uniquely assigned to one of the set of single-server queues, and each task consists of multiple iterations of different stages of execution, including task vacations and communication...

    Provided By Springer Healthcare

  • White Papers // Nov 2012

    Energy Efficient Run-Time Incremental Mapping for 3-D Networks-on-Chip

    3-D Networks-on-Chip (NoC) emerge as a potent solution to address both the interconnection and design complexity problems facing future Multi-Processor System-on-Chips (MPSoCs). Effective run-time mapping on such 3-D NoC-based MPSoCs can be quite challenging, as the arrival order and task graphs of the target applications are typically not known a...

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    HybridPlan: A Capacity Planning Technique for Projecting Storage Requirements in Hybrid Storage Systems

    Economic forces, driven by the desire to introduce flash into the high-end storage market without changing existing software-base, have resulted in the emergence of Solid-State Drives (SSDs), flash packaged in HDD form factors and capable of working with device drivers and I/O buses designed for HDDs. Unlike the use of...

    Provided By Springer Healthcare

  • White Papers // Apr 2011

    A Scalable Built-In Self-Recovery (BISR) VLSI Architecture and Design Methodology for 2D-Mesh Based On-Chip Networks

    On-Chip Networks (OCNs) have been proposed to solve the complex on-chip communication problems. In very deep-submicron era, OCN will also be affected by faults in chip due to technologies shrinking. Many researches focused on fault detection and diagnosis in OCN systems. However, these approaches didn't consider faulty OCN system recovery....

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    Trend Mining in Dynamic Attributed Graphs

    Many applications see huge demands of discovering important patterns in dynamic attributed graph. In this paper, the authors introduce the problem of discovering trend sub-graphs in dynamic attributed graphs. This new kind of pattern relies on the graph structure and the temporal evolution of the attribute values. Several interestingness measures...

    Provided By Springer Healthcare

  • White Papers // Jul 2013

    Honey, I Shrunk the Cube

    Information flooding may occur during an OLAP session when the user drills down her cube up to a very fine-grained level, because the huge number of facts returned makes it very hard to analyze them using a pivot table. To overcome this problem the authors propose a novel OLAP operation,...

    Provided By Springer Healthcare

  • White Papers // Dec 2011

    Convex-Based Thermal Management for 3D MPSoCs Using DVFS and Variable-Flow Liquid Cooling

    In this paper, the authors propose a novel online thermal management approach based on model predictive control for 3D Multi-Processors System-on-Chip (MPSoCs) using microfluidic cooling. The controller uses Dynamic Voltage and Frequency Scaling (DVFS) for the computational cores and adjusts the liquid flow rate to meet the desired performance requirements...

    Provided By Springer Healthcare

  • White Papers // Aug 2007

    A Platform for Mixed HW/SW Algorithm Specifications for the Exploration of SW and HW Partitioning

    The increasing complexity in particular of video and multimedia processing has lead to the need of developing the algorithms specification using software implementations that become in practice generic reference implementations. Mapping directly such software models in platforms made of processors and dedicated HW elements becomes harder and harder for the...

    Provided By Springer Healthcare

  • White Papers // Oct 2008

    Model Transformations for the Compilation of Multi-Processor Systems-on-Chip

    With the increase of amount of transistors which can be contained on a chip and the constant expectation for more sophisticated applications, the design of Systems-on-Chip (SoC) is more and more complex. In this paper, the authors present the use of model transformations in the context of SoC co-design. Both...

    Provided By Springer Healthcare

  • White Papers // Mar 2007

    Architectural Exploration of Heterogeneous Multiprocessor Systems for JPEG

    Multicore processors have been utilized in embedded systems and general computing applications for some time. However, these multicore chips execute multiple applications concurrently, with each core carrying out a particular task in the system. Such systems can be found in gaming, automotive real-time systems and video/image encoding devices. These system...

    Provided By Springer Healthcare

  • White Papers // Dec 2012

    A MapReduce Task Scheduling Algorithm for Deadline Constraints

    The current works about MapReduce task scheduling with deadline constraints neither take the differences of map nor reduce task, nor the cluster's heterogeneity into account. This paper proposes an extensional MapReduce task scheduling algorithm for deadline constraints in hadoop platform: MTSD. It allows user specify a job's deadline and tries...

    Provided By Springer Healthcare

  • White Papers // Jun 2013

    Measurement Study on P2P Streaming Systems

    Originally used as the default infrastructure for efficient file sharing, Peer-To-Peer (P2P) architecture achieved great successes. Now, the P2P model has been adopted for many other distributed applications, such as instant message and phone services, Internet gaming, and large-scale scientific computing. In recent years, P2P streaming systems experienced tremendous growth...

    Provided By Springer Healthcare

  • White Papers // May 2012

    A New RBAC Based Access Control Model for Cloud Computing

    Access control is an important component of cloud computing; specially, user access control management; however, access control in cloud environment is different from traditional access environment and using general access control model can't cover all entities within cloud computing, noting that cloud environment includes different entities such as data owner,...

    Provided By Springer Healthcare

  • White Papers // Apr 2013

    Keyword-Matched Data Skyline in Peer-to-Peer Systems

    Data and storage management is turning to distributed due to the huge increase in data volumes. To satisfy users' requirements and preferences, advanced query operators, such as skyline, have been introduced and implemented. Skyline offers users with interesting objects, which has been explored in centralized, distributed and Peer-To-Peer (P2P) systems....

    Provided By Springer Healthcare

  • White Papers // Nov 2007

    Analysis and Optimisation of Hierarchically Scheduled Multiprocessor Embedded Systems

    The authors present an approach to the analysis and optimization of heterogeneous multiprocessor embedded systems. The systems are heterogeneous not only in terms of hardware components, but also in terms of communication protocols and scheduling policies. When several scheduling policies share a resource, they are organized in a hierarchy. In...

    Provided By Springer Healthcare

  • White Papers // Apr 2006

    The Partitioned, Static-Priority Scheduling of Sporadic Real-Time Tasks with Constrained Deadlines on Multiprocessor Platforms

    The authors consider the partitioned scheduling of sporadic, hard-real-time tasks on a multiprocessor platform with static-priority scheduling policies. Most previous work on the static-priority scheduling of sporadic tasks upon multiprocessors has assumed implicit deadlines. They relax the equality constraint on a task's deadline and consider task systems with constrained deadlines....

    Provided By Springer Healthcare

  • White Papers // Oct 2009

    An Experimental Analysis of Joost Peer-to-Peer VoD Service

    Despite strong interest in Peer-To-Peer (P2P) Video-on-Demand (VoD) services, existing studies mostly focus on peer-to-peer or overlay protocol design based on simulations under various topological constraints. The authors believe experimental studies on a real-life P2P VoD system will provide valuable information to ISPs, network administrators, and content owners. In this...

    Provided By Springer Healthcare

  • White Papers // Nov 2008

    A Cross-Layer Approach for Improving TCP Performance in Mobile Environments

    Network-layer mobility protocols have been developed to keep continuous connectivity for mobile hosts while transparent to the higher layers. However, Due to its distinct characteristics of different from traditional TCP/IP environment, mobility poses substantial impacts on TCP performance in mobile environments. This paper proposes a new cross-layer approach, by introducing...

    Provided By Springer Healthcare

  • White Papers // Sep 2011

    Decoupled Power Allocation Through Pricing on a CDMA Reverse Link Shared by Energy-Constrained and Energy-Sufficient Data Terminals

    The authors perform market-oriented management of the reverse link of a CDMA cell populated by data terminals, each with its own data rate, channel gain, willingness to pay (wtp), and link-layer configuration, and with energy supplies that are limited for some, and inexhaustible for others. For both types of energy...

    Provided By Springer Healthcare

  • White Papers // Dec 2011

    Synchronization Analysis for Wireless TWRC Operated With Physical-Layer Network Coding

    Physical-layer Network Coding (PNC) makes use of the additive nature of the electromagnetic waves to apply network coding arithmetic at the physical layer. With PNC, the destructive effect of interference in wireless networks is eliminated and the capacity of networks can be boosted significantly. This paper addresses a key outstanding...

    Provided By Springer Healthcare

  • White Papers // Sep 2010

    Solving the Multi-Dimensional Multi-Choice Knapsack Problem With the Help of Ants

    In this paper, the authors have proposed two novel algorithms based on Ant Colony Optimization (ACO) for finding near-optimal solutions for the Multi-dimensional Multi-choice Knapsack Problem (MMKP). MMKP is a discrete optimization problem, which is a variant of the classical 0-1 Knapsack Problem and is also an NP-hard problem. Due...

    Provided By Springer Healthcare

  • White Papers // Jul 2008

    A Novel Algorithm for Associative Classification

    Associative classifiers have been the subject of intense research for the last few years. Experiments have shown that they generally result in higher accuracy than decision tree classifiers. In this paper, the authors introduce a novel algorithm for associative classification "Classification based on Association Rules Generated in a Bidirectional Approach"...

    Provided By Springer Healthcare

  • White Papers // Aug 2012

    SHIELD: A Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-Radio Wireless Networks

    Due to users' fast-growing demands, wireless spectrum is becoming a more and more scarce resource. However, the state of spectrum usage shows that while large chunks of spectrum are left idle at many places, many emerging wireless applications cannot get enough spectrum to provide their services. In contrast to existing...

    Provided By Springer Healthcare

  • White Papers // Aug 2012

    AMPLE: A Novel Incentive Approach to Adaptive-Width Channel Allocation in Multi-Hop, Non-Cooperative Wireless Networks

    Due to the limitation of radio spectrum resource and fast deployment of wireless devices, careful channel allocation is of great importance for mitigating the performance degradation caused by interference among different users in wireless networks. Most of existing work focused on fixed-width channel allocation. However, latest researches have demonstrated that...

    Provided By Springer Healthcare

  • White Papers // Aug 2012

    Exploiting Spectrum Spatial Reusability for Routing in Multi-Hop Wireless Networks

    Routing metrics are essential to achieve a good end-to-end throughput on a min-cost path in multi-hop wireless networks. Originally, most routing algorithms were based on min-hop count metric. Then link-quality aware metrics, ETX and ETT, are proposed. After that, the emergence of opportunistic and any-path routing, leads to metrics such...

    Provided By Springer Healthcare

  • White Papers // Jun 2011

    A Chaotic Encryption Scheme for Real-Time Embedded Systems: Design and Implementation

    Chaotic encryption schemes are believed to provide greater level of security than conventional ciphers. In this paper, a chaotic stream cipher is first constructed and then its hardware implementation details over Xilinx Virtex- 6 FPGA are provided. Logistic map is the simplest chaotic system and has high potential to be...

    Provided By Springer Healthcare

  • White Papers // Dec 2011

    Fault-Tolerant Relay Deployment Based on Length-Constrained Connectivity and Rerouting Centrality in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are prone to failures. To be robust to failures, the network topology should provide alternative routes to the sinks so when failures occur the routing protocol can still offer reliable delivery. The authors define l-CRC, a new centrality index which measures a node's importance to connectivity...

    Provided By Springer Healthcare

  • White Papers // Sep 2011

    Snapshot Centrality Indices in Dynamic FIFO Networks

    The paper introduces the concept of snapshot dynamic indices as centrality measures to analyze how the importance of nodes changes over time in dynamic networks. In particular, the dynamic stress-snapshot and dynamic betweenness snapshot are investigated. The authors present theoretical results on dynamic shortest paths in first-in first-out dynamic networks,...

    Provided By Springer Healthcare

  • White Papers // Jul 2011

    A Survey of Visual Sensor Network Platforms

    Recent developments in low-cost CMOS cameras have created the opportunity of bringing imaging capabilities to sensor networks. Various visual sensor platforms have been developed with the aim of integrating visual data to wireless sensor applications. This paper is to survey current visual sensor platforms according to in-network processing and compression/coding...

    Provided By Springer Healthcare

  • White Papers // Jul 2008

    Service Concentration Node in Internet Multimedia Subsystem (IMS)

    Convergence of the cellular world to an all-IP domain has stimulated the development of Internet Multimedia Subsystem (IMS) service architecture, which is touted by service providers and vendors as the next generation solution for breaking the barriers not only between cellular and IP worlds, but also between wireline and wireless...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Energy-Efficient Thermal-Aware Autonomic Management of Virtualized HPC Cloud Infrastructure

    Virtualized datacenters and clouds are being increasingly considered for traditional High-Performance Computing (HPC) workloads that have typically targeted Grids and conventional HPC platforms. However, maximizing energy efficiency and utilization of datacenter resources, and minimizing undesired thermal behavior while ensuring application performance and other Quality of Service (QoS) guarantees for HPC...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Performance Analysis of Analog Network Coding Based Two-Way Amplify-and-Forward System in Mixed Rician and Nakagami-m Fading Environment

    This paper presents the performance analysis of analog network coding-based two-way amplify-and-forward relaying under mixed Rician and Nakagami-m fading environment. Closed form expressions for both the cumulative distribution function and probability distribution function of the instantaneous end-to-end SNR are derived. Using those, the closed form expressions for the first moment,...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Handoff Management in Communication-Based Train Control Networks Using Stream Control Transmission Protocol and IEEE 802.11p WLANs

    Communication-Based Train Control (CBTC) network is an automated control network for railways that ensures the safe operation of rail vehicles using data communications. CBTC networks have stringent requirements for communication availability and latency. Wireless Local Area Network (WLAN) is a popular choice in CBTC networks due to the available commercial-off-the-shelf...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Systematic Raptor Codes for Safety Broadcast in an Unsaturated Vehicular Highway Environment

    Active safety broadcast is one of the most fundamental services in intelligent transportation systems. The repetition code proposed in Wireless Access for Vehicular Environment (WAVE) standard is inefficient in realistic channel conditions and rapidly changing network topologies. In this paper, the authors propose the use of systematic raptor codes as...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Performance Evaluation of Multiple-Antenna IEEE 802.11p Transceivers Using an FPGA-Based MIMO Vehicular Channel Emulator

    The IEEE 802.11p standard has been optimized for low-delay small-bandwidth wireless communications to provide vehicular safety services. However, IEEE 802.11p transceivers can considerably improve their robustness by incorporating MIMO transmission methods. Moreover, multiple antennas can also be used to increase the data transfer rate of IEEE 802.11p transceivers, a requirement...

    Provided By Springer Healthcare

  • White Papers // May 2012

    Nudge: Intermediaries' Role in Interdependent Network Security

    By employing an interdependent security game-theoretic framework, the authors study how individual Internet Service Providers can coordinate the investment decisions of end users to improve the security and trustworthiness of the overall system. They discuss two different forms of intervention: rebates in combination with penalties (pay for outcome) and cost-subsidies...

    Provided By Springer Healthcare

  • White Papers // Aug 2008

    Application of Data Mining to Network Intrusion Detection: Classifier Selection Model

    As network attacks have increased in number and severity over the past few years, Intrusion Detection System (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS...

    Provided By Springer Healthcare