Technicka univerzita v Kosiciach

Displaying 1-15 of 15 results

  • White Papers // Nov 2010

    Intendance and Maintaining of Wireless Networking

    Wireless network is more and more exploited technologies, because of its availability and connectivity from any place in the range of its access point, without restrictions on cable. Very important area in wireless networks is the managing of the wireless network. The paper describes proposed secure wireless network with a...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    Architecture of Multi-Core Computer With Data Driven Computation Model

    This paper describes tile computing paradigm and introduces representatives of tile computing computer architectures with control and data driven computation models and describes data flow computing paradigm. This paper introduces architecture of computer with data driven computation model based on principles of tile computing which is the modern approach to...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    Programming SIP Services - The SIP APIS

    The Session Initiation Protocol (SIP) is a signalling protocol developed to set up, modify and tear down multimedia sessions such as voice and video calls, game sessions, messages exchange and the like over the Internet Protocol (IP). A few of protocols have been design for it. However, the SIP seems...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    Multiparty Ballot Counting in an Internet Voting Scheme

    The authors present a voting scheme in which shares of the ballots are sent to multiple talliers. The talliers operate in parallel and cooperate together to count the ballots by using the technique of the Secure Multi-Party Computations (SMPC) in the Virtual Ideal Functionality Framework (VIFF). The counting process is...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    Anomaly and Misuse Intrusions Variability Detection

    In this paper, the authors discuss their research in developing intrusion detection software framework for modeling, simulation and detection computer system intrusion based on partially ordered events and patterns - FEIIDS. The paper describes problematic of intrusion detection systems and intrusions detection. They provide concrete design of developed framework based...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    QoS in Network Traffic Management

    This paper deals with the optimization of data routing processes and with optimization of deployed Quality of Service mechanisms in computer networks. The paper addresses the problems related to requirement of monitoring and managing of network infrastructures with attention given to data routing mechanisms in network and often used QoS...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    Transformation of a Token Bucket to a Work Conserving Link

    Quality of Service (QoS) in IP multimedia converged networks which provides different serving levels of different traffic flows is a crucial issue. The token bucket mechanism is one of core QoS concept whose well understanding is required and improve modelling and implementation techniques required in such multimedia networks. This paper...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    Context Help Searching for wxHaskell Graphic Library

    This paper deals with two different approaches in programming sphere, and joins them in one entity through its practical part. One approach is context searching that is applied on the second approach, functional graphic library wxHaskell that is designed and implemented within Eclipse development environment through the plug-in extension. As...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Aug 2010

    Motivation and Barriers of ICT Adoption in Small and Medium-Sized Enterprises

    The current business world is undergoing consistent change. To survive in the current competitive environment companies have to be able to respond to such changes. The ability to react quickly to these changes is itself becoming a competitive advantage for Small and Medium-sized Enterprises (SMEs) compared to those that are...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Jun 2010

    Collaboration in Virtual Reality of Intelligent Agents

    This paper presents a system for high level collaboration between humans and intelligent agents in a virtual reality. The proposed system is capable of creating virtual worlds with the simulation of Newtonian physics and their visualization as interface for humans. Furthermore, with voice recognition and synthesization the human interface provides...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Jun 2010

    Parallel Scene Splitting and Assigning for Fast Ray Tracing

    Photorealistic rendering is very often used area in computer graphics. It is used to display human body in medicine, buildings in architecture and also in other areas of the life. For photorealistic rendering are very important powerful computer, than it is relative difficult on computing. To render a 3D object...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // May 2010

    Internet Protocol in the Service of Streaming

    One way, how to deal with the packet losses for video transmitted over congested network is using connection-oriented, end-to-end reliable protocol. In this paper, the authors focused on transmission control protocols, which fulfill the conditions for reliable delivery of information. TCP Tahoe and TCP Reno implementation supported by TCP are...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // May 2010

    VLAB at the Institute of Computer Systems and Networks FIIT STU

    The authors build a full network laboratory simulator that is as realistic as possible. To provide the "Real" feeling, they use the Cisco router emulator called Dynamips, which is able to execute Cisco IOS for certain router platforms. By combining this emulator with host and network virtualization technologies they build...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // May 2010

    Architecture for Distributed Data Collection for Management of Crisis Situations Using Trusted Agent Execution

    This paper proposes a distributed architecture designed for management of crisis situations where multiple actors are involved from various organizations with different competences and communicating over IP-based networks including wireless devices. In such settings requirements exist for secure communication and trusted collection of data from various sources. The primary role...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // May 2010

    Qualifying and Segmentation of Historical Process Data Using Optimal Experiment Design Techniques for Supporting Parameter Estimation

    With the wide-spread application of process models and simulators, estimation of model parameters becomes a crucial project. In chemical industry the processes are mostly highly non-linear which makes the identification of model parameters difficult. In the practice the process simulators are not just for design but optimization of operating plants...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Aug 2010

    Motivation and Barriers of ICT Adoption in Small and Medium-Sized Enterprises

    The current business world is undergoing consistent change. To survive in the current competitive environment companies have to be able to respond to such changes. The ability to react quickly to these changes is itself becoming a competitive advantage for Small and Medium-sized Enterprises (SMEs) compared to those that are...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // May 2010

    VLAB at the Institute of Computer Systems and Networks FIIT STU

    The authors build a full network laboratory simulator that is as realistic as possible. To provide the "Real" feeling, they use the Cisco router emulator called Dynamips, which is able to execute Cisco IOS for certain router platforms. By combining this emulator with host and network virtualization technologies they build...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // May 2010

    Internet Protocol in the Service of Streaming

    One way, how to deal with the packet losses for video transmitted over congested network is using connection-oriented, end-to-end reliable protocol. In this paper, the authors focused on transmission control protocols, which fulfill the conditions for reliable delivery of information. TCP Tahoe and TCP Reno implementation supported by TCP are...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // May 2010

    Architecture for Distributed Data Collection for Management of Crisis Situations Using Trusted Agent Execution

    This paper proposes a distributed architecture designed for management of crisis situations where multiple actors are involved from various organizations with different competences and communicating over IP-based networks including wireless devices. In such settings requirements exist for secure communication and trusted collection of data from various sources. The primary role...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Jun 2010

    Parallel Scene Splitting and Assigning for Fast Ray Tracing

    Photorealistic rendering is very often used area in computer graphics. It is used to display human body in medicine, buildings in architecture and also in other areas of the life. For photorealistic rendering are very important powerful computer, than it is relative difficult on computing. To render a 3D object...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // May 2010

    Qualifying and Segmentation of Historical Process Data Using Optimal Experiment Design Techniques for Supporting Parameter Estimation

    With the wide-spread application of process models and simulators, estimation of model parameters becomes a crucial project. In chemical industry the processes are mostly highly non-linear which makes the identification of model parameters difficult. In the practice the process simulators are not just for design but optimization of operating plants...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Jun 2010

    Collaboration in Virtual Reality of Intelligent Agents

    This paper presents a system for high level collaboration between humans and intelligent agents in a virtual reality. The proposed system is capable of creating virtual worlds with the simulation of Newtonian physics and their visualization as interface for humans. Furthermore, with voice recognition and synthesization the human interface provides...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    Anomaly and Misuse Intrusions Variability Detection

    In this paper, the authors discuss their research in developing intrusion detection software framework for modeling, simulation and detection computer system intrusion based on partially ordered events and patterns - FEIIDS. The paper describes problematic of intrusion detection systems and intrusions detection. They provide concrete design of developed framework based...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    Multiparty Ballot Counting in an Internet Voting Scheme

    The authors present a voting scheme in which shares of the ballots are sent to multiple talliers. The talliers operate in parallel and cooperate together to count the ballots by using the technique of the Secure Multi-Party Computations (SMPC) in the Virtual Ideal Functionality Framework (VIFF). The counting process is...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    Intendance and Maintaining of Wireless Networking

    Wireless network is more and more exploited technologies, because of its availability and connectivity from any place in the range of its access point, without restrictions on cable. Very important area in wireless networks is the managing of the wireless network. The paper describes proposed secure wireless network with a...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    Architecture of Multi-Core Computer With Data Driven Computation Model

    This paper describes tile computing paradigm and introduces representatives of tile computing computer architectures with control and data driven computation models and describes data flow computing paradigm. This paper introduces architecture of computer with data driven computation model based on principles of tile computing which is the modern approach to...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    QoS in Network Traffic Management

    This paper deals with the optimization of data routing processes and with optimization of deployed Quality of Service mechanisms in computer networks. The paper addresses the problems related to requirement of monitoring and managing of network infrastructures with attention given to data routing mechanisms in network and often used QoS...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    Transformation of a Token Bucket to a Work Conserving Link

    Quality of Service (QoS) in IP multimedia converged networks which provides different serving levels of different traffic flows is a crucial issue. The token bucket mechanism is one of core QoS concept whose well understanding is required and improve modelling and implementation techniques required in such multimedia networks. This paper...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    Context Help Searching for wxHaskell Graphic Library

    This paper deals with two different approaches in programming sphere, and joins them in one entity through its practical part. One approach is context searching that is applied on the second approach, functional graphic library wxHaskell that is designed and implemented within Eclipse development environment through the plug-in extension. As...

    Provided By Technicka univerzita v Kosiciach

  • White Papers // Nov 2010

    Programming SIP Services - The SIP APIS

    The Session Initiation Protocol (SIP) is a signalling protocol developed to set up, modify and tear down multimedia sessions such as voice and video calls, game sessions, messages exchange and the like over the Internet Protocol (IP). A few of protocols have been design for it. However, the SIP seems...

    Provided By Technicka univerzita v Kosiciach