Springer

Displaying 1-40 of 212 results

  • White Papers // Feb 2012

    Generating Test Cases for Marine Safety and Security Scenarios: A Composition Framework

    In this paper, the authors address the problem of testing complex computer models for infrastructure protection and emergency response based on detailed and realistic application scenarios using advanced computational methods and tools. Specifically, they focus here on testing situation analysis decision support models for marine safety & security operations as...

    Provided By Springer

  • White Papers // Feb 2012

    Estimating the Sentiment of Social Media Content for Security Informatics Applications

    Inferring the sentiment of social media content, for instance blog posts and forum threads, is both of great interest to security analysts and technically challenging to accomplish. This paper presents two computational methods for estimating social media sentiment which address the challenges associated with Web-based analysis. Each method formulates the...

    Provided By Springer

  • White Papers // Mar 2012

    The Spatio-Temporal Modeling for Criminal Incidents

    Law enforcement agencies monitor criminal incidents. With additional geographic and demographic data, law enforcement analysts look for spatio-temporal patterns in these incidents in order to predict future criminal activity. When done correctly these predictions can inform actions that can improve security and reduce the impact of crime. Effective prediction requires...

    Provided By Springer

  • White Papers // Feb 2012

    Detecting Unknown Malicious Code by Applying Classification Techniques on OpCode Patterns

    In previous studies classification algorithms were employed successfully for the detection of unknown malicious code. Most of these studies extracted features based on byte n-gram patterns in order to represent the inspected files. In this paper, the authors represent the inspected files using OpCode n-gram patterns which are extracted from...

    Provided By Springer

  • White Papers // Dec 2011

    Protected Control Packets to Prevent Denial of Services Attacks in IEEE 802.11 Wireless Networks

    Denial-of-Service (DoS) attack exploits inherent limitation of resources in wireless networks in attempt to overwhelm and exhaust their finite capacity. In wireless networks, clear-text form of Control Packets (CP) exhibits a security flaw that can be exploited by attackers to render the networks incapable of providing normal services. While these...

    Provided By Springer

  • White Papers // Oct 2011

    A Survey on Biometric Cryptosystems and Cancelable Biometrics

    Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable biometrics represent emerging technologies of biometric template protection addressing these concerns and improving public confidence and acceptance of biometrics. In addition, biometric cryptosystems provide mechanisms...

    Provided By Springer

  • White Papers // Jan 2012

    Intrusion Detection Model Based on Selective Packet Sampling

    Recent experimental work by Androulidakis and Papavassiliou has shown that it is possible to maintain a high level of network security while selectively inspecting packets for the existence of intrusive activity, thereby resulting in a minimal amount of processing overhead. In this paper, a statistical approach for the modeling of...

    Provided By Springer

  • White Papers // Oct 2011

    2DPCA Fractal Features and Genetic Algorithm for Efficient Face Representation and Recognition

    In this paper, the authors present an automatic face recognition system. They show that fractal features obtained from Iterated Function System allow a successful face recognition and outperform the classical approaches. They propose a new fractal feature extraction algorithm based on genetic algorithms to speed up the feature extraction step....

    Provided By Springer

  • White Papers // Oct 2011

    Forward-Looking WDM Network Reconfiguration With Per-Link Congestion Control

    The authors study reconfigurations of wavelength-routed Wavelength Division Multiplexing (WDM) networks in response to lightpath demand changes, with the objective of servicing more lightpath demands without additional network resources from a long-term network operation point of view. For the reconfiguration problem under study, they assume WDM network operators are provided...

    Provided By Springer

  • White Papers // Jun 2011

    Two-Round Contributory Group Key Exchange Protocol for Wireless Network Environments

    With the popularity of group-oriented applications, secure group communication has recently received much attention from cryptographic researchers. A Group Key Exchange (GKE) protocol allows that participants cooperatively establish a group key that is used to encrypt and decrypt transmitted messages. Hence, GKE protocols can be used to provide secure group...

    Provided By Springer

  • White Papers // Jul 2011

    Accuracy of Depolarization and Delay Spread Predictions Using Advanced Ray-Based Modeling in Indoor Scenarios

    This paper investigates the prediction accuracy of an advanced deterministic propagation model in terms of channel depolarization and frequency selectivity for indoor wireless propagation. In addition to specular reflection and diffraction, the developed ray tracing tool considers penetration through dielectric blocks and/or diffuse scattering mechanisms. The sensitivity and prediction accuracy...

    Provided By Springer

  • White Papers // Jul 2011

    An Orthogonal Spectrum Sharing Scheme for Wireless Sensor Networks

    It is not economically viable to allocate a dedicated spectrum band to Wireless Sensor Networks (WSNs). Moreover, sharing a spectrum band with incumbent (primary) system compromises the reliability and performance of both the systems due to interference from one system to another. In this paper, the authors address this limitation...

    Provided By Springer

  • White Papers // Jun 2011

    Quality of Service Implications of Power Control and Multiuser Detection-Based Cross-Layer Design

    In order to allow for dense spatial reuse in wireless ad hoc networks, multiple access interference must be dealt with. This calls for advanced physical layer techniques, such as MultiUser Detection (MUD) or power control. However, these techniques can only be efficiently applied to ad hoc networks when they are...

    Provided By Springer

  • White Papers // Jul 2011

    Vector Perturbation Based Adaptive Distributed Precoding Scheme With Limited Feedback for CoMP Systems

    A downlink adaptive distributed precoding scheme is proposed for Coordinated Multi-Point (CoMP) transmission systems. The serving Base Station (BS) obtains the optimal precoding vector via user feedback. Meanwhile, the precoding vector of each coordinated BS is determined by adaptive gradient iteration according to the perturbation vector and the adjustment factor...

    Provided By Springer

  • White Papers // Jun 2011

    Low Complexity Antenna Selection for V-BLAST Systems With OSIC Detection

    Multiple-Input Multiple-Output (MIMO) systems have an advantage of spectral efficiency compared to single-input single-output systems, which means that the MIMO systems have significantly higher data throughput. The VBLAST (Vertical Bell Laboratories Layered Space Time) scheme is a popular transceiver structure which has relatively good performance. In the V-BLAST scheme, Ordered...

    Provided By Springer

  • White Papers // Jul 2011

    State of the Art Baseband DSP Platforms for Software Defined Radio: A Survey

    Software Defined Radio (SDR) is an innovative approach which is becoming a more and more promising technology for future mobile handsets. Several proposals in the field of embedded systems have been introduced by different universities and industries to support SDR applications. This paper presents an overview of current platforms and...

    Provided By Springer

  • White Papers // Jul 2011

    Binary De Bruijn Sequences for DS-CDMA Systems: Analysis and Results

    Code Division Multiple Access (CDMA) using Direct Sequence (DS) spread spectrum modulation provides multiple access capability essentially thanks to the adoption of proper sequences as spreading codes. The ability of a DSCDMA receiver to detect the desired signal relies to a great extent on the auto-correlation properties of the spreading...

    Provided By Springer

  • White Papers // Mar 2012

    An Economic Perspective of Message-Dropping Attacks in Peer-to-Peer Overlays

    Peer-to-peer networks have many advantageous security properties, including decentralization, natural load-balancing, and data replication. However, one disadvantage of decentralization is its exclusion of any central authority who can detect and evict malicious peers from the network. It is therefore, relatively easy to sustain distributed denial-of-service attacks against these networks; malicious...

    Provided By Springer

  • White Papers // Mar 2012

    Specializing Network Analysis to Detect Anomalous Insider Actions

    Collaborative Information Systems (CIS) enable users to coordinate efficiently over shared tasks in complex distributed environments. For flexibility, they provide users with broad access privileges, which, as a side-effect, leave such systems vulnerable to various attacks. Some of the more damaging malicious activities stem from internal misuse, where users are...

    Provided By Springer

  • White Papers // Jul 2011

    TCP NCE: A Unified Solution for Non-Congestion Events to Improve the Performance of TCP Over Wireless Networks

    In this paper, the authors propose a unified solution called Transmission Control Protocol (TCP) for Non-Congestion Events (TCP NCE), to overcome the performance degradation of TCP due to non-congestion events over wireless networks. TCP NCE is capable to reduce the unnecessary reduction of congestion window size and retransmissions caused by...

    Provided By Springer

  • White Papers // Jul 2011

    Adaptive Utility-Based Scheduling Algorithm for Multiuser MIMO Uplink

    Resource allocation issues are discussed in the context of a virtual multiuser MIMO uplink assuming users equipped with a single antenna. A scheduling algorithm, which efficiently mitigates the Co-Channel Interference (CCI) arising from the spatial correlation of users sharing common resources, is proposed. Users are selected using an incremental approach...

    Provided By Springer

  • White Papers // Jul 2011

    Sense Through Wall Human Detection Using UWB Radar

    In this paper, the authors discuss techniques for sense through wall human detection for different types of walls. They have focused on detection of stationary human target behind wall based on breathing movements. In detecting the breathing motion, a Doppler based method is used. Also a new approach based on...

    Provided By Springer

  • White Papers // Jul 2011

    On the Lambert-W Function for Constrained Resource Allocation in Cooperative Networks

    In cooperative networks, a variety of resource allocation problems can be formulated as constrained optimization with system-wide objective, e.g., maximizing the total system throughput, capacity or ergodic capacity, subject to constraints from individual users, e.g., minimum data rate, transmit power limit, and from the system, e.g., power budget, total number...

    Provided By Springer

  • White Papers // Jul 2011

    A New Approach to Geographic Routing for Location Aided Cluster Based MANETs

    Routing has been the main challenge for ad hoc networks due to dynamic topology as well as resource constraints. Completely GPS (Global Positioning System) free as well as GPS scarce positioning systems for wireless, mobile, ad-hoc networks has been proposed recently by many authors. High computational overhead and high mobility...

    Provided By Springer

  • White Papers // Jul 2011

    Differential Radio Map-Based Robust Indoor Localization

    While wireless local area network-based indoor localization is attractive, the problems concerning how to capture the signal-propagating character in the complex dynamic environment and how to accommodate the receiver gain difference of different mobile devices are challenging. In this paper, the authors solve these problems by modeling them as common...

    Provided By Springer

  • White Papers // Sep 2011

    CRLBs for WSNs Localization in NLOS Environment

    Determination of Cramer-Rao Lower Bound (CRLB) as an optimality criterion for the problem of localization in Wireless Sensor Networks (WSNs) is a very important issue. Currently, CRLBs have been derived for Line-Of-Sight (LOS) situation in WSNs. However, one of major problems for accurate localization in WSNs is Non-Line-Of-Sight (NLOS) propagation....

    Provided By Springer

  • White Papers // Jul 2011

    Design of Zone-Based Bandwidth Management Scheme in IEEE 802.16 Multi-Hop Relay Networks

    IEEE 802.16 Wireless Network technology is a hot research issue in recent years. It provides wider coverage of radio and higher speed wireless access, and Quality-of-Service plays an important part in the standard. For mobile multihop wireless network, IEEE 802.16j/MR network not only can supply large area wireless deployment, but...

    Provided By Springer

  • White Papers // Aug 2011

    Distributed Wireless Information Flow Allocation in Multiple Access Networks

    The authors present a general framework for distributed wireless information flow allocation problem in multiple access networks, where the End Users (EUs) can seek wireless flows from multiple Access Points (APs). They aim to minimize the power consumption while satisfying each EU's minimum data rate requirement but not violating peak...

    Provided By Springer

  • White Papers // Jul 2011

    Ubiquitous Robust Communications for Emergency Response Using Multi-Operator Heterogeneous Networks

    A number of disasters in various places of the planet have caused an extensive loss of lives, severe damages to properties and the environment, as well as a tremendous shock to the survivors. For relief and mitigation operations, emergency responders are immediately dispatched to the disaster areas. Ubiquitous and robust...

    Provided By Springer

  • White Papers // Nov 2011

    Mobile User-Preference-Based Data Dissemination on Mobile P2P Networks

    A considerable number of studies have been performed recently on MObile Peer-to-peer NETworks (MOPNETs), as the number of services based on mobile devices has increased. However, existing studies still reveal numerous shortcomings, such as bandwidth overhead, and redundant transmission in terms of multi-broadcast between peers. Especially, owing to the characteristics...

    Provided By Springer

  • White Papers // Nov 2011

    Clustering and OFDMA-Based MAC Protocol (COMAC) for Vehicular Ad Hoc Networks

    The IEEE community is working on the wireless access in vehicular environments as a main technology for vehicular ad hoc networks. The Medium Access Control (MAC) protocol of this system known as IEEE 802.11p is based on the Distributed Coordination Function (DCF) of the IEEE 802.11 and enhanced DCF of...

    Provided By Springer

  • White Papers // Nov 2011

    The Impact of Spatial Correlation on the Statistical Properties of the Capacity of Nakagami-M Channels With MRC and EGC

    In this paper, the authors have studied the statistical properties of the instantaneous channel capacity of spatially correlated Nakagami-m channels for two different diversity combining methods, namely Maximal Ratio Combining (MRC) and Equal Gain Combining (EGC). Specifically, using the statistical properties of the instantaneous signal-to-noise ratio, they have derived the...

    Provided By Springer

  • White Papers // Dec 2011

    Minimum-Length Scheduling With Rate Control in Wireless Networks: A Shortest Path Approach

    In this paper, the minimum-length scheduling problem in wireless networks is studied, where each source of traffic has a finite amount of data to deliver to its corresponding destination. The authors' objective is to obtain a joint scheduling and rate control policy to minimize the total time required to deliver...

    Provided By Springer

  • White Papers // Oct 2011

    Hidden Node Aware Routing Method Using Highsensitive Sensing Device for Multi-Hop Wireless Mesh Network

    Throughput maximization is one of the main challenges in multi-hop Wireless Mesh Network (WMN). Throughput of the multi-hop WMN network seriously degrades due to the presence of the hidden node. In order to avoid this problem, the authors use a combination of the high-sensitive sensing function and beacon signalling at...

    Provided By Springer

  • White Papers // Nov 2011

    A New and Efficient Adaptive Scheduling Packets for the Uplink Traffic in WiMAX Networks

    In this paper, an adaptive scheduling packets algorithm for the uplink traffic in WiMAX networks is proposed. The proposed algorithm is designed to be completely dynamic, mainly in networks that use various Modulation and Coding Schemes (MCSs). Using a cross-layer approach and the states of the uplink virtual queues in...

    Provided By Springer

  • White Papers // Oct 2011

    A Survey and Taxonomy of Distributed Certificate Authorities in Mobile Ad Hoc Networks

    Certificate Authorities (CAs) are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, the authors cannot use centralized CAs, in Mobile Ad hoc NETworks (MANETs). So, many efforts have been made to adapt CA to the special characteristics of MANETs...

    Provided By Springer

  • White Papers // Nov 2011

    Minimum Decoding Trellis Length and Truncation Depth of Wrap-Around Viterbi Algorithm for TBCC in Mobile WiMAX

    The performance of the wrap-around Viterbi decoding algorithm with finite truncation depth and fixed decoding trellis length is investigated for tail-biting convolutional codes in the mobile WiMAX standard. Upper bounds on the error probabilities induced by finite truncation depth and the uncertainty of the initial state are derived for the...

    Provided By Springer

  • White Papers // Nov 2011

    Hadamard Upper Bound on Optimum Joint Decoding Capacity of Wyner Gaussian Cellular MAC

    This paper presents an original analytical expression for an upper bound on the optimum joint decoding capacity of Wyner Circular Gaussian Cellular Multiple Access Channel (C-GCMAC) for uniformly distributed Mobile Terminals (MTs). This paper demonstrates that the actual capacity converges to the theoretical upper bound under the constraints like low...

    Provided By Springer

  • White Papers // Oct 2011

    A New Reduced-Complexity Detection Scheme for Zero-Padded OFDM Transmissions

    Recently, Zero-Padding Orthogonal Frequency Division Multiplexing (ZP-OFDM) has been proposed as an alternative solution to the traditional Cyclic Prefix (CP)-OFDM, to ensure symbol recovery regardless of channels nulls. Various ZP-OFDM receivers have been proposed in the literature, trading off performance with complexity. In this paper, the authors propose a novel...

    Provided By Springer

  • White Papers // Oct 2011

    Delay-Throughput Analysis of Multi-Channel MAC Protocols in Ad Hoc Networks

    Since, delay and throughput are important Quality of Service parameters in many wireless applications, the authors study the performance of different multi-channel Media Access Control (MAC) protocols in ad hoc networks by considering these measures in this paper. For this, they derive average access delays and throughputs in closed-form for...

    Provided By Springer