Springer Science+Business Media

Displaying 1-40 of 607 results

  • White Papers // Feb 2011

    Efficient Decision Procedures for Message Deducibility and Static Equivalence

    The authors consider two standard notions in formal security protocol analysis: message deducibility and static equivalence under equational theories. They present new polynomial-time algorithms for deciding both notions under subterm convergent equational theories and under a theory representing symmetric encryption with the prefix property. For these equational theories, polynomial-time algorithms...

    Provided By Springer Science+Business Media

  • White Papers // Nov 2011

    Signalling Minimizing Handover Parameter Optimization Algorithm for LTE Networks

    In currently deployed cellular networks, a lot of time and effort is put by operators into the optimization of radio resource management functions. The use of self-optimization algorithms will eliminate the need for manual monitoring and offline analysis, as these algorithms constantly strive to improve network performance in an automated...

    Provided By Springer Science+Business Media

  • White Papers // Feb 2012

    Adaptive Query Processing in Distributed Settings

    In this paper, the authors discuss Adaptive Query Processing (AdQP) techniques for distributed environments. They also investigate the issues involved in extending AdQP techniques originally proposed for single-node processing so that they become applicable to multi-node environments as well. In order to make it easier for the reader to understand...

    Provided By Springer Science+Business Media

  • White Papers // Nov 2009

    Continuous Processing of Preference Queries in Data Streams

    Preference queries have received considerable attention in the recent past, due to their use in selecting the most preferred objects, especially when the selection criteria are contradictory. Nowadays, a significant number of applications require the manipulation of time evolving data and therefore, the study of continuous query processing has recently...

    Provided By Springer Science+Business Media

  • White Papers // Jul 2009

    Improving Data Availability for Better Access Performance: A Study on Caching Scientific Data on Distributed Desktop Workstations

    Client-side data caching serves as an excellent mechanism to store and analyze the rapidly growing scientific data, motivating distributed, client-side caches built from unreliable desktop storage contributions to store and access large scientific data. They offer several desirable properties, such as performance impedance matching, improved space utilization, and high parallel...

    Provided By Springer Science+Business Media

  • White Papers // Dec 2008

    Beyond Music Sharing: An Evaluation of Peer-to-Peer Data Dissemination Techniques in Large Scientific Collaborations

    The avalanche of data from scientific instruments and the ensuing interest from geographically distributed users to analyze and interpret it accentuates the need for efficient data dissemination. A suitable data distribution scheme will find the delicate balance between conflicting requirements of minimizing transfer times, minimizing the impact on the network,...

    Provided By Springer Science+Business Media

  • White Papers // Sep 2011

    Human Motion Recognition Using a Wireless Sensor-Based Wearable System

    The future of human computer interaction systems lies in how intelligently these systems can take into account the user's context. Research on recognizing the daily activities of people has progressed steadily, but little focus has been devoted to recognizing jointly activities as well as movements in a specific activity. For...

    Provided By Springer Science+Business Media

  • White Papers // Apr 2009

    Connectivity Properties of Large-Scale Sensor Networks

    In wireless sensor networks, both nodes and links are prone to failures. In this paper, the authors study connectivity properties of large-scale wireless sensor networks and discuss their implicit effect on routing algorithms and network reliability. They assume a network model of n sensors which are distributed randomly over a...

    Provided By Springer Science+Business Media

  • White Papers // Oct 2011

    Standardisation Advancements in the Area of Routing for Mobile Ad-Hoc Networks

    Mobile Ad hoc NETworks (MANETs) are self-organized and fully distributed networks that rely on the collaboration of participating devices to route data from source to destination. The MANET paradigm is expected to enable ubiquitous mobile communication and thus the proliferation of pervasive applications. The MANET Working Group (WG) of the...

    Provided By Springer Science+Business Media

  • White Papers // Jul 2010

    Security Model for Emergency Real-Time Communications in Autonomous Networks

    Towards the proliferation of architectures, tools and applications that have the potential to be used during an emergency rescue mission, the authors present a framework for emergency real-time communication using autonomous networks, called emergency Mobile Ad-hoc NETworks (eMANETs). By eMANETs they refer to networks that are deployed in emergency cases...

    Provided By Springer Science+Business Media

  • White Papers // Nov 2010

    A Hybrid CAC Algorithm for Maximizing Downlink Capacity of M-WiMAX Systems

    Due to the implementation of an Adaptive Modulation-Coding (AMC) mechanism in the 802.16e physical layer, each connection's bandwidth requirements cannot be statically computed, but they derive as a function of the terminals' instantaneous Signal-to-Noise Ratio (SNR). Therefore, the Connection Admission Control (CAC) mechanism fails to establish an efficient policy that...

    Provided By Springer Science+Business Media

  • White Papers // Jun 2010

    Parameterized Reliability Prediction for Component-Based Software Architectures

    Critical properties of software systems, such as reliability, should be considered early in the development, when they can govern crucial architectural design decisions. A number of design-time reliability analysis methods has been developed to support this task. However, the methods are often based on very low-level formalisms, and the connection...

    Provided By Springer Science+Business Media

  • White Papers // Sep 2010

    A Framework for Multi-Level SLA Management

    Service-Oriented Architectures (SOA) represent an architectural shift for building business applications based on loosely-coupled services. In a multi-layered SOA environment the exact conditions under which services are to be delivered can be formally specified by Service Level Agreements (SLAs). However, typical SLAs are just specified at the customer-level and do...

    Provided By Springer Science+Business Media

  • White Papers // Mar 2010

    A Process to Effectively Identify "Guilty" Performance Antipatterns

    The problem of interpreting the results of software performance analysis is very critical. Software developers expect feedbacks in terms of architectural design alternatives (e.g., split a software component in two components and re-deploy one of them), whereas the results of performance analysis are either pure numbers (e.g. mean values) or...

    Provided By Springer Science+Business Media

  • White Papers // Jun 2009

    Modelling Layered Component Execution Environments for Performance Prediction

    Software architects often use model-based techniques to analyze performance (e.g., response times), reliability and other extra-functional properties of software systems. These techniques operate on models of software architecture and execution environment, and are applied at design time for early evaluation of design alternatives, especially to avoid implementing systems with insufficient...

    Provided By Springer Science+Business Media

  • White Papers // May 2009

    Combining Aspect and Model-Driven Engineering Approaches for Software Process Modeling and Execution

    One major advantage of executable software process models is that once defined, they can be simulated, checked and validated in short incremental and iterative cycles. This also makes them a powerful asset for important process improvement decisions such as resource allocation, deadlock identification and process management. In this paper, the...

    Provided By Springer Science+Business Media

  • White Papers // May 2009

    Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis

    Pointer analyses derived from a Context-Free-Language (CFL) reachability formulation achieve very high precision, but they do not scale well to compute the points-to solution for an entire large program. The authors goal is to increase significantly the scalability of the currently most precise points-to analysis for Java. This CFL-reachability analysis...

    Provided By Springer Science+Business Media

  • White Papers // Jan 2011

    CVPP: A Tool Set for Compositional Verification of Control - Flow Safety Properties

    This paper describes CVPP, a tool set for compositional verification of control - flow safety properties for programs with procedures. The compositional verification principle that underlies CVPP is based on maximal models constructed from component specifications. Maximal models replace the actual components when verifying the whole program, either for the...

    Provided By Springer Science+Business Media

  • White Papers // Feb 2012

    Competition on Software Verification

    This paper describes the definitions, rules, setup, procedure, and results of the 1st International Competition on Software Verification. The verification community has performed competitions in various areas in the past, and SV-COMP'12 is the first competition of verification tools that take software programs as input and run a fully automatic...

    Provided By Springer Science+Business Media

  • White Papers // Mar 2010

    Shape Refinement Through Explicit Heap Analysis

    Shape analysis is a promising technique to prove program properties about recursive data structures. The challenge is to automatically determine the data-structure type, and to supply the shape analysis with the necessary information about the data structure. The authors present a stepwise approach to the selection of instrumentation predicates for...

    Provided By Springer Science+Business Media

  • White Papers // Mar 2010

    A Cross-Layer Design of Wireless IP Systems Using Effective Bandwidth and MQAM Adaptive Modulation

    In this paper, the authors introduce an effective bandwidth-based Call Admission Control (CAC) with adaptive modulation technique to manage the traffic in a wireless IP-based network. Furthermore, in order to efficiently use the physical resources of the network, they take advantage of an adaptive MQAM (M-ary Quadrature Amplitude Modulation) to...

    Provided By Springer Science+Business Media

  • White Papers // May 2010

    Quality of Service Based Protection in Optical Networks Using Diversity Constraint

    In this paper, the authors present a simple approach towards providing quality of service based partial protection in optical networks. They use a diversity based protection mechanism to ensure that in the event of link/node failures, a fraction of demand is always survived. To determine routing of optical paths while...

    Provided By Springer Science+Business Media

  • White Papers // Mar 2010

    Performance Analysis of a Single-User MISO Ultra-Wideband Time Reversal System With DFE

    This paper presents an analysis of the performance of a baseband Multiple-Input Single-Output (MISO) Time Reversal Ultra-WideBand system (TR-UWB) incorporating a symbol spaced Decision Feedback Equalizer (DFE). A semi-analytical performance analysis based on a Gaussian approach is considered, which matched well with simulation results, even for the DFE case. The...

    Provided By Springer Science+Business Media

  • White Papers // May 2010

    Privacy-Preserving and Tokenless Chaotic Revocable Face Authentication Scheme

    With the large-scale proliferation of biometric systems, privacy and irrevocability issues of their data have become a hot research issue. Recently, some researchers proposed a couple of schemes to generate BioHash, e.g., PalmHash, however, in this paper, the authors point out that the previous schemes are costly in terms of...

    Provided By Springer Science+Business Media

  • White Papers // May 2010

    Performance Analysis of Push-to-Talk Over IEEE 802.16e With Sleep Mode and Idle Mode

    The authors investigate how much power saving can be achieved for a Push-To-Talk (PTT) service by employing sleep mode and idle mode in the IEEE 802.16e. In this paper, a mobile station by employing sleep mode during an on-session and idle mode during an off-session of the PTT service is...

    Provided By Springer Science+Business Media

  • White Papers // May 2010

    SCTP: Designed for Timely Message Delivery?

    To reduce cost and provide more flexible services, telecommunication operators are currently replacing traditional telephony networks with IP-networks. To support the requirements of telephony signaling in IP-networks, SCTP was standardized. SCTP solves a number of problems that follows from using TCP for telephony signaling transport. However, the design of SCTP...

    Provided By Springer Science+Business Media

  • White Papers // Jun 2010

    Effect of Mobile Terminal Heterogeneity on Call Blocking/dropping Probability in Cooperative Heterogeneous Cellular Networks

    It is envisaged that Next Generation Wireless Networks (NGWN) will be heterogeneous, consisting of multiple Radio Access Technologies (RATs) coexisting in the same geographical area. In these heterogeneous wireless networks, mobile terminals of different capabilities (heterogeneous terminals) will be used by subscribers to access network services. The authors investigate the...

    Provided By Springer Science+Business Media

  • White Papers // Jun 2010

    An Efficient Incremental Face Annotation for Large Scale Web Services

    This paper proposes an incremental face annotation framework for sharing and publishing photographs which contain faces under a large scale web platform such as a social network service with millions of users. Unlike the conventional face recognition environment addressed by most existing works, the image databases being accessed by the...

    Provided By Springer Science+Business Media

  • White Papers // May 2010

    Verification System Robust to Occlusion Using Low-Order Zernike Moments of Palmprint Sub-Images

    This paper proposes a palmprint based verification system which uses low-order Zernike moments of palmprint sub-images. Euclidean distance is used to match the Zernike moments of corresponding sub-images of query and enrolled palmprints. These matching scores of sub-images are fused using a weighted fusion strategy. The proposed system can also...

    Provided By Springer Science+Business Media

  • White Papers // Jun 2010

    Biometric Bits Extraction Through Phase Quantization Based on Feature Level Fusion

    Biometric bits extraction has emerged as an essential technique for the study of biometric template protection as well as biometric cryptosystems. In this paper, the authors present a non-invertible but revocable bits extraction technique by means of quantizing the facial data from two feature extractors in the phase domain, which...

    Provided By Springer Science+Business Media

  • White Papers // May 2010

    Standard Audio Format Encapsulation (SAFE)

    One characteristic that distinguishes speaker recognition (identification, verification, classification, tracking, etc.) from other biometrics is that it is designed to operate with devices and over channels that were created for other technologies and functions. That characteristic supports broad, inexpensive, and speedy deployments. The explosion of mobile devices has exacerbated the...

    Provided By Springer Science+Business Media

  • White Papers // Jun 2010

    Manifold Learning for Face Recognition Under Changing Illumination

    Appearance-based methods have been proven to be useful for face recognition tasks. The main problem with appearance-based methods originates from the multimodality of face images. It is known that images of different people in the original data space are more closely located to each other than those of the same...

    Provided By Springer Science+Business Media

  • White Papers // Oct 2009

    Decentralising a Service-Oriented Architecture

    Service-oriented computing is becoming an increasingly popular paradigm for modelling and building distributed systems in open and heterogeneous environments. However, proposed service-oriented architectures are typically based on centralised components, such as service registries or service brokers, that introduce reliability, management, and performance issues. This paper describes an approach to fully...

    Provided By Springer Science+Business Media

  • White Papers // Mar 2011

    Business Process Families Using Model-Driven Techniques

    Traditionally, businesses have used IT systems as mechanical advantage for automating static a-priori-defined repetitive tasks. Increased business dynamics has placed greater demands of adaptation and agility on to IT systems. Service oriented architecture is a step in this direction through separation of business process concerns from application functionality. There have...

    Provided By Springer Science+Business Media

  • White Papers // Nov 2010

    The Impact of Infostation Density on Vehicular Data Dissemination

    Vehicle-to-Vehicle and Vehicle-to-Roadside communications are going to become an indispensable part of the modern day automotive experience. For people on the move, vehicular networks can provide critical network connectivity and access to real-time information. Infostations play a vital role in these networks by acting as gateways to the Internet and...

    Provided By Springer Science+Business Media

  • White Papers // Oct 2009

    Probabilistic Seeking Prediction in P2P VoD Systems

    In P2P VoD streaming systems, user behavior modeling is critical to help optimise user experience as well as system throughput. However, it still remains a challenging task due to the dynamic characteristics of user viewing behavior. In this paper, the authors consider the problem of user seeking prediction which is...

    Provided By Springer Science+Business Media

  • White Papers // May 2010

    A Dynamic Service Composition Schema for Pervasive Computing

    Pervasive computing, the new computing paradigm aiming at providing services anywhere at anytime, poses great challenges on dynamic service composition. Existing service composition methods can hardly meet the requirements of dynamism and performance for pervasive computing. This paper proposes a Petri net based service model to formally describe the function...

    Provided By Springer Science+Business Media

  • White Papers // Dec 2009

    GUIDE-Gradient: A Guiding Algorithm for Mobile Nodes in WLAN and Ad-Hoc Networks

    Whereas there is a lot of work related to finding the location of users in WLAN and ad-hoc networks, guiding users in these networks remains mostly an unexplored area of research. In this paper, the authors present the concept of node-to-node guidance and introduce a method that can be used...

    Provided By Springer Science+Business Media

  • White Papers // Feb 2009

    Route Duration Modeling for Mobile Ad-Hoc Networks

    In this paper, the authors present a model that estimates the time duration of routes formed by several intermediate nodes in mobile multi-hop ad-hoc networks. First, they analyze a 3-node route, where only the intermediate node is in movement while source and destination nodes remain static. From this case, they...

    Provided By Springer Science+Business Media

  • White Papers // Apr 2010

    Optimization of Service Discovery in Wireless Sensor Networks

    With the advancement of ubiquitous computing, new types of Wireless Sensor Networks (WSNs) have emerged where sensors perform their tasks even as their surrounding network neighborhood changes, nodes terminate unexpectedly and signal strengths vary dynamically. In such scenarios, it is very important to use efficient service discovery algorithms adapt dynamically...

    Provided By Springer Science+Business Media