Springer Healthcare

Displaying 1-40 of 700 results

  • White Papers // Aug 2014

    Competitive Location in Cognitive Radio Networks

    In this paper, the authors address the problem of strategic base stations placement in cognitive radio networks. They consider a primary user, operating on the frequency channels of a primary network, and an operator (a leader) facing the competition of a second operator (a follower). These operators are willing to...

    Provided By Springer Healthcare

  • White Papers // Jul 2014

    Geometrical Localization Algorithm for 3-D Wireless Sensor Networks

    In this paper, the authors propose an efficient range free localization scheme for large scale three dimensional wireless sensor networks. Their system environment consists of two type of sensors, randomly deployed static sensors and global positioning system equipped moving sensors. These moving anchors travels across the network field and broadcast...

    Provided By Springer Healthcare

  • White Papers // Jun 2014

    A Comparative Study on Resource Allocation and Energy Efficient Job Scheduling Strategies in Large-Scale Parallel Computing Systems

    In the large-scale parallel computing environment, resource allocation and energy efficient techniques are required to deliver the Quality of Services (QoS) and to reduce the operational cost of the system. Because the cost of the energy consumption in the environment is a dominant part of the owner's and user's budget....

    Provided By Springer Healthcare

  • White Papers // Jun 2014

    Phoenix: DGA-Based Botnet Tracking and Intelligence

    Modern botnets rely on Domain-Generation Algorithms (DGAs) to build resilient command-and-control infrastructures. Given the prevalence of this mechanism, recent paper has focused on the analysis of DNS traffic to recognize botnets based on their DGAs. While previous paper has concentrated on detection, the authors focus on supporting intelligence operations. They...

    Provided By Springer Healthcare

  • White Papers // Jun 2014

    A Survey and Taxonomy on Energy Efficient Resource Allocation Techniques for Cloud Computing Systems

    In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application (e.g., content delivery networks, MapReduce, web applications, and the like) workloads having contentious allocation requirements in terms of...

    Provided By Springer Healthcare

  • White Papers // Jun 2014

    Dual-Access Way-Prediction Cache for Embedded Systems

    Way-Prediction (WP) caches have advantages of reducing power consumption and latency for highly associative data caches and thus are favorable for embedded systems. In this paper, the authors propose an enhanced way-prediction cache, Dual-Access Way-Prediction (DAWP) cache, to cope with the weakness of the WP cache. The prediction logic designed...

    Provided By Springer Healthcare

  • White Papers // May 2014

    Instruction-Level Steganography for Covert Trigger-Based Malware

    Trigger-based malware is designed to remain dormant and undetected unless a specific trigger occurs. Such behavior occurs in prevalent threats such as backdoors and environment-dependent (targeted) malware. Currently, trigger-based malicious code is often hidden in rarely exercised code paths in benign host binaries, and relies upon a lack of code...

    Provided By Springer Healthcare

  • White Papers // Apr 2014

    CubeLoad: A Parametric Generator of Realistic OLAP Workloads

    Differently from OLTP workloads, OLAP workloads are hardly predictable due to their inherently extemporary nature. Besides, obtaining real OLAP workloads by monitoring the queries actually issued in companies and organizations is quite hard. On the other hand, hardware and software benchmarking in the industrial world, as well as comparative evaluation...

    Provided By Springer Healthcare

  • White Papers // Apr 2014

    WABRM: A Work-Load Aware Balancing and Resource Management Framework for Swift on Cloud

    Fueled by increasing demand of big data processing, distributed storage systems have been more and more widely used by enterprises. However, in these systems, few storage nodes holding enormous amount of hotspot data could become bottlenecks. This stems from the fact that most typical distributed storage systems mainly provide data...

    Provided By Springer Healthcare

  • White Papers // Apr 2014

    An Overview of the Commercial Cloud Monitoring Tools: Research Dimensions, Design Issues, and State-of-the-Art

    Cloud monitoring activity involves dynamically tracking the Quality of Service (QoS) parameters related to virtualized resources (e.g., VM, storage, network, appliances, etc.), the physical resources they share, the applications running on them and data hosted on them. Applications and resources configuration in cloud computing environment is quite challenging considering a...

    Provided By Springer Healthcare

  • White Papers // Apr 2014

    Evaluation Methodology for Data Communication-Aware Application Partitioning

    Heterogeneous multicore architectures appear to be a promising solution to the ever-increasing computational demands of applications in embedded as well as high-performance computing domains. Nevertheless, inefficient application partitioning for such systems may result in a considerable reduction in the anticipated performance improvement. Consequently, proper mechanisms are required to evaluate quality...

    Provided By Springer Healthcare

  • White Papers // Mar 2014

    Hierarchical Approach to Optimization of Parallel Matrix Multiplication on Large-Scale Platforms

    Many state-of-the-art parallel algorithms, which are widely used in scientific applications executed on high-end computing systems, were designed in the twentieth century with relatively small-scale parallelism in mind. Indeed, while in 1990s a system with few hundred cores was considered a powerful supercomputer; modern top supercomputers have millions of cores....

    Provided By Springer Healthcare

  • White Papers // Feb 2014

    Unmixing-Based Content Retrieval System for Remotely Sensed Hyperspectral Imagery on GPUs

    In this paper the authors present a new unmixing-based retrieval system for remotely sensed hyperspectral imagery. The need for this kind of system is justified by the exponential growth in the volume and number of remotely sensed data sets from the surface of the earth. This is particularly the case...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    Measuring Precision of Modeled Behavior

    Conformance checking techniques compare observed behavior (i.e., event logs) with modeled behavior for a variety of reasons. For example, discrepancies between a normative process model and recorded behavior may point to fraud or inefficiencies. The resulting diagnostics can be used for auditing and compliance management. Conformance checking can also be...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    Transactional Support for Adaptive Indexing

    Adaptive indexing initializes and optimizes indexes incrementally, as a side effect of query processing. The goal is to achieve the benefits of indexes while hiding or minimizing the costs of index creation. However, index-optimizing side effects seem to turn read-only queries into update transactions that might, for example, create lock...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    ADLU: A Novel Anomaly Detection and Location-Attribution Algorithm for UWB Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics. Besides energy consumption considerations, security has emerged as an equally important aspect in their network design. This is because WSNs are vulnerable to various types of attacks and to node compromises,...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    DynTunKey: A Dynamic Distributed Group Key Tunneling Management Protocol for Heterogeneous Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are being used for many applications ranging from mobile target surveillance to intelligent home networking. Due to the sensitive nature of the data transmitted by these applications, appropriate protection mechanisms are needed to prevent attackers from exploiting the weaknesses of the radio links. In this paper,...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    Big Data: A Survey

    In this paper, the authors review the background and state-of-the-art of big data. They first introduce the general background of big data and review related technologies, such as could computing, Internet of Things, data centers, and Hadoop. They then focus on the four phases of the value chain of big...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    InterCloud RAIDer: A Do-It-Yourself Multi-Cloud Private Data Backup System

    In this paper, the authors introduce InterCloud RAIDer, which realizes a multi-cloud private data backup system by composing a data deduplication technique to reduce the overall storage overhead, erasure coding to achieve redundancy at low overhead, which is dispersed across multiple cloud services to realize fault-tolerance against individual service providers,...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    A Decision Framework for Placement of Applications in Clouds That Minimizes Their Carbon Footprint

    Cloud computing gives users much freedom on where they host their computation and storage. However, the CO2 emission of a job depends on the location and the energy efficiency of the data centers where it is run. The authors developed a decision framework that determines to move computation with accompanying...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    An Improved Task Assignment Scheme for Hadoop Running in the Clouds

    Now-a-days, data-intensive problems are so prevalent that numerous organizations in various industries have to face them in their business operation. It is often crucial for enterprises to have the capability of analyzing large volumes of data in an effective and timely manner. MapReduce and its open-source implementation Hadoop dramatically simplified...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Data Management in Cloud Environments: NoSQL and NewSQL Data Stores

    Advances in web technology and the proliferation of mobile devices and sensors connected to the Internet have resulted in immense processing and storage requirements. Cloud computing has emerged as a paradigm that promises to meet these requirements. This paper focuses on the storage aspect of cloud computing, specifically on data...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Service Selection in Web Service Compositions Optimizing Energy Consumption and Service Response Time

    A challenging task in web service composition is the runtime binding of a set of interconnected abstract services to concrete ones. This question, formulated as the service selection problem, has been studied in the area of service compositions implementing business processes. Despite the abundance of work on this topic, few...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Catching Modern Botnets Using Active Integrated Evidential Reasoning

    Botnets are now recognized as one of the major security threats to start various security attacks (e.g., spamming, DDoS). Although substantial research has been done towards botnet detection, it is becoming much more difficult today, especially for highly polymorphic, intelligent and stealthy modern botnets. Traditional botnet detection (e.g., signature, anomaly...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Agile Methods for Embedded Systems Development - A Literature Review and a Mapping Study

    There is a wide area of applications that use embedded systems, and the number of such systems keeps growing. The required functionality and complexity of embedded systems are also constantly increasing, and development of such products is becoming increasingly harder. This requires new thinking on the product development processes, and...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    An Elastic Virtual Infrastructure for Research Applications (ELVIRA)

    Cloud computing infrastructures provide a way for researchers to source the computational and storage resources they require to conduct their work and to collaborate within distributed research teams. The authors provide an overview of a cloud-based elastic virtual infrastructure for research applications that they have established to provide researchers with...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Towards Full Network Virtualization in Horizontal IaaS Federation: Security Issues

    Horizontal IaaS federation exploits datacenter for federation of IaaS provider by supplying virtual nodes (e.g. virtual machines, virtual switches, and virtual routers) and virtual links. Today's datacenters for cloud computing do not supply full network virtualization in terms of user-level network management and user-agreed network topology. The datacenters lack the...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Efficient and Highly Portable Deterministic Multithreading (DetLock)

    In this paper, the authors present DetLock, a runtime system to ensure deterministic execution of multithreaded programs running on multicore systems. DetLock does not rely on any hardware support or kernel modification to ensure determinism. For tracking the progress of the threads, logical clocks are used. Unlike previous approaches, which...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Securing Cloud Using Third Party Threaded IDS

    Cloud computing is universal, staying anywhere in the world user can access the cloud applications. Mainly cloud computing will provide services to the users using Internet. Cloud storage services offer user-friendly, easily accessible and money-saving ways of storing and automatically backing up arbitrary data. These services are available on-demand on...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    A Survey on Securing the Virtual Cloud

    In this paper, the authors present a survey and analysis of the current security measures implemented in cloud computing and the hypervisors that support it. The viability of an efficient virtualization layer has led to an explosive growth in the cloud computing industry, exemplified by Amazon's Elastic Cloud, Apple's iCloud,...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    A Routing Framework for Energy Harvesting Wireless Nanosensor Networks in the Terahertz Band

    Wireless NanoSensor Networks (WNSNs) will allow novel intelligent nanomaterial-based sensors, or nanosensors, to detect new types of events at the nanoscale in a distributed fashion over extended areas. Two main characteristics are expected to guide the design of WNSNs architectures and protocols, namely, their Terahertz Band wireless communication and their...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    AppaaS: Offering Mobile Applications as a Cloud Service

    With the huge number of offerings in the mobile application market, the choice of mobile applications that best fit particular objectives is challenging. Therefore, there is a demand for a platform elevating the momentum of mobile applications that can adapt their behavior according to the user's context. This paper proposes...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Efficient Parallel Spectral Clustering Algorithm Design for Large Data Sets Under Cloud Computing Environment

    Spectral clustering algorithm has proved be more effective than most traditional algorithms in finding clusters. However, its high computational complexity limits its effect in actual application. This paper combines the spectral clustering with MapReduce, through evaluation of sparse matrix Eigen-value and computation of distributed cluster, puts forward the improvement ideas...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Analytic Performance Modeling and Optimization of Live VM Migration

    Cloud computing is based on largely distributed virtual environments that provide Infrastructure-as-a-Service (IaaS) services to consumers allowing them to lease computing resources that scale to their needs. These services rely on virtualization as an important technology that facilitates dynamic resource management to meet Service Level Agreements (SLA) of disparate applications...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Linearly Homomorphic Structure-Preserving Signatures and their Applications

    Structure-Preserving Signatures (SPS) are signature schemes where messages, signatures and public keys all consist of elements of a group over which a bilinear map is efficiently computable. This property makes them useful in cryptographic protocols as they nicely compose with other algebraic tools (like the celebrated groth-sahai proof systems). In...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Efficient Cryptosystems from 2k-th Power Residue Symbols

    In this paper, the authors introduced a new generalization of the cryptosystem. The so-obtained cryptosystems are shown to be secure under the quadratic residuosity assumption. Further, they enjoy a number of useful features including fast decryption, optimal ciphertext expansion, and homomorphic property. The authors believe that their proposal is the...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    An Agents and Artifacts Approach to Distributed Data Mining

    In this paper the authors propose a novel Distributed Data Mining (DDM) approach based on the agents and artifacts paradigm, as implemented in CArtAgO, where artifacts encapsulate data mining tools, inherited from Weka, that agents can use while engaged in collaborative, distributed learning processes. Target hypothesis are currently constrained to...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data

    Suppose that a set of multiple users uploads in every time period encrypted values of some data. The considered problem is how an untrusted data aggregator can compute the sum of all users' values but nothing more. However, as advocated by the authors, the proposed encryption scheme suffers from some...

    Provided By Springer Healthcare

  • White Papers // Sep 2013

    Differentially Private Set-Valued Data Release Against Incremental Updates

    Publication of the private set-valued data will provide enormous opportunities for counting queries and various data mining tasks. Compared to those previous methods based on partition-based privacy models (e.g., k-anonymity), differential privacy provides strong privacy guarantees against adversaries with arbitrary background knowledge. However, the existing solutions based on differential privacy...

    Provided By Springer Healthcare

  • White Papers // Sep 2013

    Repairing Event Logs Using Timed Process Models

    Process mining aims to infer meaningful insights from process-related data and attracted the attention of practitioners, tool-vendors, and researchers in recent years. Traditionally, event logs are assumed to describe the as-is situation. But this is not necessarily the case in environments where logging may be compromised due to manual logging....

    Provided By Springer Healthcare

  • White Papers // Oct 2012

    Capacity Maximization through Energy-Aware Multi-Mode Relaying

    In future wireless mobile networks, data rate and quality of service are expected to be comparable to those of wired deployments. To achieve this target, novel architectures must be adopted, successfully countering the disadvantages of the wireless transmission. Inspired by that, cooperative relaying was proposed because of the various gains...

    Provided By Springer Healthcare

  • White Papers // Aug 2010

    A Case Study on Measuring Statistical Data in the Tor Anonymity Network

    The Tor network is one of the largest deployed anonymity networks, consisting of 1500+ volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its large user-base has made it attractive for researchers to analyze usage of a real deployed anonymity network. The recent growth of the network...

    Provided By Springer Healthcare

  • White Papers // Mar 2010

    A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search

    For nearest neighbor search, a user queries a server for nearby Points Of Interest (POIs) with his/her location information. The authors' aim is to protect the user's sensitive information against adversaries including the location-based service itself. Most research efforts have elaborated on reasonable trade-offs between privacy and utility. Their propose...

    Provided By Springer Healthcare

  • White Papers // May 2012

    Nudge: Intermediaries' Role in Interdependent Network Security

    By employing an interdependent security game-theoretic framework, the authors study how individual Internet Service Providers can coordinate the investment decisions of end users to improve the security and trustworthiness of the overall system. They discuss two different forms of intervention: rebates in combination with penalties (pay for outcome) and cost-subsidies...

    Provided By Springer Healthcare

  • White Papers // May 2011

    Communicating and Migratable Interactive Multimedia Documents

    In ubiquitous computing environments, new interactive multimedia applications need to be mobile, device independent, potentially distributed across devices and to leverage existing services in the environment. Multimedia documents, when combined with scripting technologies, can represent complex interactive multimedia applications. However, they are still not appropriate for the creation of migratable,...

    Provided By Springer Healthcare

  • White Papers // Jul 2010

    Annotation Based Personalized Adaptation and Presentation of Videos for Mobile Applications

    Personalized multimedia content which suits user preferences and the usage environment, and as a result improves the user experience, gains more importance. In this paper, the authors describe an architecture for personalized video adaptation and presentation for mobile applications which is guided by automatically generated annotations. By including this annotation...

    Provided By Springer Healthcare

  • White Papers // Feb 2012

    Selections: Internet Voting With Over-the Shoulder Coercion-Resistance

    The present Selections, a new cryptographic voting protocol that is end-to-end verifiable and suitable for Internet voting. After a one-time in-person registration, voters can cast ballots in an arbitrary number of elections. The authors say a system provides over-the-shoulder coercion resistance if a voter can undetectably avoid complying with an...

    Provided By Springer Healthcare

  • White Papers // Sep 2011

    Algorithmic Aspects of Risk Management

    Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In contrast, the authors use risk computation to drive changes in an operating system's security configuration. This allows risk management to occur in...

    Provided By Springer Healthcare

  • White Papers // Jun 2012

    Stochastic Modeling and Analysis Using QPME: Queueing Petri Net Modeling Environment V2.0

    Queueing Petri nets are a powerful formalism that can be exploited for modeling distributed systems and analyzing their performance and scalability. By combining the modeling power and expressiveness of queueing networks and stochastic Petri nets, queueing Petri nets provide a number of advantages. In this paper, the authors present their...

    Provided By Springer Healthcare

  • White Papers // Dec 2010

    CUDACS: Securing the Cloud With CUDA-Enabled Secure Virtualization

    While on the one hand unresolved security issues pose a barrier to the widespread adoption of cloud computing technologies, on the other hand the computing capabilities of even commodity HW are boosting, in particular thanks to the adoption of -core technologies. For instance, the Nvidia Compute Unified Device Architecture (CUDA)...

    Provided By Springer Healthcare

  • White Papers // Apr 2012

    Understanding Link Behavior of Non-Intrusive Wireless Body Sensor Networks

    The wireless Body Sensor Network (BSN) is used to detect and transmit physiological data such as vital signs by using radio wave communication. It offers a large saving potential for future healthcare applications because hospitalization of patients with chronic diseases can be kept at a minimum. The radio wave communication...

    Provided By Springer Healthcare

  • White Papers // Jul 2010

    Separability and Topology Control of Quasi Unit Disk Graphs

    A deep understanding of the structural properties of wireless networks is critical for evaluating the performance of network protocols and improving their designs. Many protocols for wireless networks - routing, topology control, information storage/retrieval and numerous other applications - have been based on the idealized Unit-Disk Graph (UDG) network model....

    Provided By Springer Healthcare

  • White Papers // Mar 2012

    Comparison of User Traffic Characteristics on Mobile-Access Versus Fixed-Access Networks

    The authors compare Web traffic characteristics of mobile-versus fixed-access end-hosts, where herein the term "Mobile" refers to access via cell towers, using for example the 3G/UMTS standard, and the term "Fixed" includes Wi-Fi access. It is well-known that connection speeds are in general slower over mobile-access networks, and also that...

    Provided By Springer Healthcare

  • White Papers // May 2012

    TCAMChecker: A Software Approach to the Error Detection and Correction of TCAM-Based Networking Systems

    Ternary Content Addressable Memories (TCAMs) are widely used in network devices carrying out the core operation of single-operation lookups. TCAMs are the core component of many networking devices such as routers, switches, firewalls and intrusion detection/prevention systems. Unfortunately, they are susceptible to errors caused by environmental factors such as radiation....

    Provided By Springer Healthcare

  • White Papers // Aug 2012

    A Nonparametric Bayesian Approach for Opportunistic Data Transfer in Cellular Networks

    The number of mobile Internet users is growing rapidly, as well as the capability of mobile Internet devices. As a result, the enormous amount of traffic generated everyday on mobile Internet is pushing cellular services to their limits. The authors see great potential in the idea of scheduling the transmission...

    Provided By Springer Healthcare

  • White Papers // Jan 2010

    Supervised Grid-of-Tries: A Novel Framework for Classifier Management

    Packet classification is the problem of identifying which one of a set of rules maintained in a database is best matched by an incoming packet at a router and taking the action specified by the rule. This is a uniform enabler for many new network services like firewalls, quality of...

    Provided By Springer Healthcare

  • White Papers // Jan 2011

    Unveiling the Bittorrent Performance in Mobile Wimax Networks

    As mobile Internet environments are becoming widespread, how to revamp Peer-To-Peer (P2P) operations for mobile hosts is gaining more attention. In this paper, the authors carry out empirical measurement of BitTorrent users in a commercial WiMAX network. They investigate how handovers in WiMAX networks impact the BitTorrent performance, how BitTorrent...

    Provided By Springer Healthcare

  • White Papers // Apr 2010

    Failure Data-Driven Selective Node-Level Duplication to Improve MTTF in High Performance Computing Systems

    This paper presents the authors' analysis of the failure behavior of large scale systems using the failure logs collected by Los Alamos National Laboratory on 22 of their computing clusters. They note that not all nodes show similar failure behavior in the systems. Their objective, therefore, was to arrive at...

    Provided By Springer Healthcare

  • White Papers // Sep 2009

    Model-Free Probabilistic Localization of Wireless Sensor Network Nodes in Indoor Environments

    The authors present a technique that makes up a practical probabilistic approach for locating wireless sensor network devices using the commonly available signal strength measurements (RSSI). From the RSSI measurements between transmitters and receivers situated on a set of landmarks, they construct appropriate probabilistic descriptors associated with a device's position...

    Provided By Springer Healthcare

  • White Papers // Aug 2012

    HERO - A Home Based Routing in Pocket Switched Networks

    Pocket Switched Networks (PSNs) take advantage of human mobility to distribute data. Investigations on real-world trace data indicate that human mobility follows a simple reproducible pattern: a human being usually visits a few places at high frequencies. These most frequently visited places form the home of a node, which is...

    Provided By Springer Healthcare

  • White Papers // Aug 2012

    Routing for Information Leakage Reduction in Multi-Channel Multi-Hop Ad-Hoc Social Networks

    This paper investigates the routing problem for information leakage reduction in multi-channel ad-hoc networks. In particular, the authors focus on two routing models: Trusted Group Multicast (TGM) and Confidential Unicast (CU). In TGM, a group member shares the information with all other group members; while in CU, a group member...

    Provided By Springer Healthcare

  • White Papers // Dec 2011

    Cognitive Radio MIMO Gaussian Broadcast Channels With the Power Constraint

    The cognitive radio multiple-input multiple-output Gaussian broadcast channels are studied where multiple antennas are available for both primary users and secondary users in a spectrum sharing environment, and the sum-rate capacity is also obtained under both the SUs' transmit power constraint and interference power constraint at the primary receivers. The...

    Provided By Springer Healthcare

  • White Papers // May 2013

    Contributory Provision Point Contracts - A Risk-Free Mechanism for Hedging Cloud Energy Costs

    Cloud computing services rely on electricity to power compute-servers, network equipment, cooling systems, and other supporting infrastructure. As such, energy costs are a substantial outgoing to public providers of cloud computing services. On-demand pricing, where consumers are not required to give advance notice of requirements, does not aid the provider...

    Provided By Springer Healthcare

  • White Papers // May 2013

    Flood Modelling for Cities Using Cloud Computing

    Urban flood risk modeling is a highly topical example of intensive computational processing. Such processing is increasingly required by a range of organizations including local government, engineering consultancies and the insurance industry to fulfill statutory requirements and provide professional services. As the demands for this type of work become more...

    Provided By Springer Healthcare

  • White Papers // Mar 2013

    Towards a Cloud-Based Integrity Measurement Service

    The aim of this paper is to propose the use of a cloud-based integrity management service coupled with a trustworthy client component - in the form of the Trust Extension Device (TED) platform - as a means to increase the quality of the security evaluation of a client. Thus, in...

    Provided By Springer Healthcare

  • White Papers // Mar 2013

    My Private Cloud - Granting Federated Access to Cloud Resources

    The authors describe the research undertaken in the six month JISC/EPSRC funded "My Private Cloud" project, in which they built a demonstration cloud file storage service that allows users to login to it, by using their existing credentials from a configured trusted identity provider. Once authenticated, users are shown a...

    Provided By Springer Healthcare

  • White Papers // Jan 2011

    Providing Built-in Keyword Search Capabilities in RDBMS

    A common approach to performing keyword search over relational databases is to find the minimum Steiner trees in database graphs transformed from relational data. These methods, however, are rather expensive as the minimum Steiner tree problem is known to be NP-hard. Further, these methods are independent of the underlying Relational...

    Provided By Springer Healthcare

  • White Papers // Oct 2011

    Trie-Join: A Trie-Based Method for Efficient String Similarity Joins

    A string similarity join finds similar pairs between two collections of strings. Many applications, e.g., data integration and cleaning, can significantly benefit from an efficient string-similarity-join algorithm. In this paper, the authors study string similarity joins with edit-distance constraints. Existing methods usually employ a filter-and-refine framework and suffer from the...

    Provided By Springer Healthcare

  • White Papers // Apr 2012

    A Survey of Computation Offloading for Mobile Systems

    Mobile systems have limited resources, such as battery life, network bandwidth, storage capacity, and processor performance. These restrictions may be alleviated by computation of f loading: sending heavy computation to resourceful servers and receiving the results from these servers. Many issues related to offloading have been investigated in the past...

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    Service Models and Pricing Schemes for Cloud Computing

    Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. To ensure large-scale adoption of cloud computing by businesses, several challenges including security, privacy, trust, performance and other quality attributes need to be addressed. Also, as with other utility services, adequate...

    Provided By Springer Healthcare

  • White Papers // Aug 2010

    Classifier Evaluation and Attribute Selection Against Active Adversaries

    Many datamining applications, such as spam filtering and intrusion detection, are faced with active adversaries. In all these applications, the future data sets and the training data set are no longer from the same population, due to the transformations employed by the adversaries. Hence a main assumption for the existing...

    Provided By Springer Healthcare

  • White Papers // Mar 2009

    The Challenge of Assuring Data Trustworthiness

    With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institutions, it is critical to ensure that data is trustworthy so that effective decisions can be made based on these data. In this paper, the authors first discuss motivations and...

    Provided By Springer Healthcare

  • White Papers // Nov 2012

    Fair Anonymous Authentication for Location Based Services

    The authors propose an efficient anonymous authentication scheme that provides intractability and unlinkability of mobile devices, while accessing location-based services. Following other recent approaches for mobile anonymity, in their scheme the network operator acts as an anonymous credential issuer for its users. However, their scheme supports credential non-transferability, without requiring...

    Provided By Springer Healthcare

  • White Papers // Dec 2010

    Approximate and Exact Hybrid Algorithms for Private Nearest-Neighbor Queries with Database Protection

    Mobile devices with global positioning capabilities allow users to retrieve Points Of Interest (POI) in their proximity. To protect user privacy, it is important not to disclose exact user coordinates to un-trusted entities that provide location-based services. Currently, there are two main approaches to protect the location privacy of users:...

    Provided By Springer Healthcare

  • White Papers // Feb 2006

    An Extensible, Distributed Simulation Environment for Peer Data Management Systems

    Peer Data Management Systems (PDMS) have recently attracted attention by the database community. One of the main challenges of this paradigm is the development and evaluation of indexing and query processing strategies for large-scale networks. So far, research groups working in this area build their own testing environment which first...

    Provided By Springer Healthcare

  • White Papers // Sep 2011

    Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences During Distributed Query Processing

    In a centralized setting, the declarative nature of SQL is a major strength: a user can simply describe what they wants to retrieve, and need not worry about how the resulting query plan is actually generated and executed. However, in a decentralized setting, two query plans that produce the same...

    Provided By Springer Healthcare

  • White Papers // Sep 2008

    Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism

    Location-Based Services (LBS) can be accessed from a variety of mobile devices to obtain value added information related to the location of the user. Most of the times, these services are provided by a trusted company (e.g. a telecommunications company). In this paper, the authors propose a novel technique to...

    Provided By Springer Healthcare

  • White Papers // Jun 2011

    Security Notions for Broadcast Encryption

    In this paper, the authors clarifies the relationships between security notions for broadcast encryption. In the past, each new scheme came with its own definition of security, which makes them hard to compare. The authors thus define a set of notions, as done for signature and encryption, for which they...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    An Overview on the Structure and Applications for Business Intelligence and Data Mining in Cloud Computing

    Cloud computing is a new computational paradigm which has attracted a lot of interest within the business and research community. Its objective is to integrate a wide amount of heterogeneous resources in an online way to provide services under demand to different types of users, which are liberated from the...

    Provided By Springer Healthcare

  • White Papers // Jun 2012

    Privacy, Security and Trust in Cloud Computing

    Cloud computing refers to the underlying infrastructure for an emerging model of service provision that has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. These new features have a direct impact on Information Technology (IT)...

    Provided By Springer Healthcare