Technische Universitat Ilmenau

Displaying 1-34 of 34 results

  • White Papers // May 2014

    Reliability-Aware Design Optimization for Multiprocessor Embedded Systems

    In this paper the authors present an approach for the reliability-aware design optimization of real-time systems on multi-processor platforms. The optimization is based on an extension of well accepted fault- and process-models. They combine utilization of hardware replication and software re-execution techniques to tolerate transient faults. A System Fault Tree...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jan 2014

    Schema-Based Scheduling of Event Processors and Buffer Minimization for Queries on Structured Data Streams

    The authors introduce an extension of the XQuery language, FluX that supports event-based query processing and the conscious handling of main memory buffers. Purely event-based queries of this language can be executed on streaming XML data in a very direct way. They then develop an algorithm that allows to efficiently...

    Provided By Technische Universitat Ilmenau

  • White Papers // Nov 2013

    Applications of Interactive Proof to Data Flow Analysis and Security

    The authors show how to formalize a small imperative programming language in the theorem prover Isabelle/HOL, how to define its semantics, and how to prove properties about the language, its type systems, and a number of data-flow analyses. The emphasis is not on formalizing a complex language deeply, but to...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jul 2013

    An Evaluation of Strict Timestamp Ordering Concurrency Control for Main-Memory Database Systems

    With the fundamental change of hardware technology, main-memory database systems have emerged as the next generation of DBMS. Thus, new methods to execute transactions in a serial, lock-free mode have been investigated and successfully employed, for instance in H-Store or HyPer. Although these techniques allow for unprecedentedly high throughput for...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jul 2013

    Spatial and Temporal Isolation of Virtual CAN Controllers

    Virtualization is a key technology to enable the use of multi-core processors in automotive embedded systems. For side-by-side execution of mixed-criticality applications that access shared communication infrastructures, a secure and safe virtualization of I/O devices is required, which features a complete spatial and temporal isolation of individual virtual interfaces. The...

    Provided By Technische Universitat Ilmenau

  • White Papers // May 2013

    Protecting PUF Error Correction by Codeword Masking

    One of the main applications of Physical Unclonable Functions (PUFs) is unique key generation. While the advantages of PUF-based key extraction and embedding have been shown in several papers, physical attacks on it have gained only little interest until now. In this paper, the authors demonstrate the feasibility of a...

    Provided By Technische Universitat Ilmenau

  • White Papers // Apr 2013

    Short Message Noisy Network Coding

    Short message Noisy Network Coding (SNNC) differs from Noisy Network Coding (NNC) in that one transmits many short messages in blocks rather than using one long message with repetitive encoding. Several properties of SNNC are developed. First, SNNC achieves the same rates as NNC for memoryless networks where each node...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jan 2013

    Minimum Mean Squared Error Interference Alignment

    To achieve the full multiplexing gain of MIMO interference networks at high SNRs, the interference from different transmitters must be aligned in lower-dimensional subspaces at the receivers. Recently a distributed "Max-SINR" algorithm for precoder optimization has been proposed that achieves interference alignment for sufficiently high SNRs. The authors show that...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jan 2013

    A Method for Constructing Enterprise-wide Access Views on Business Objects

    Modern application landscapes consist of a multitude of inter-connected business applications exchanging data in manifold ways. These business applications are used by employees who take on several organizational roles. However, when broadening the scope to an enterprise-wide perspective, lack of clarity and uncertainty prevail regarding the questions which roles have...

    Provided By Technische Universitat Ilmenau

  • White Papers // Dec 2012

    Data Protection in a Cloud-Enabled Smart Grid

    Today's electricity grid is evolving into the smart grid which ought to be reliable, flexible, efficient, and sustainable. To fulfill these requirements, the smart grid draws on a plenty of core technologies. Advanced Metering Infrastructure (AMI). These technologies facilitate easy and fast accumulation of different data, e.g. ne-grained meter readings....

    Provided By Technische Universitat Ilmenau

  • White Papers // Dec 2012

    Automotive Proxy-Based Security Architecture for CE Device Integration

    Increasing adoption of Consumer Electronic (CE) devices in the automotive world encourages car makers to propose new CE-related features each year. However, car complexity and security concerns slow down this process. The ubiquitous and personal nature of such devices represents a real threat for car IT systems. The authors believe...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jun 2012

    X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle

    Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-Middle (MitM) attacks on SSL/TLS, very little proof exists in the public realm. In this paper, the authors report on the development and deployment of Crossbear, a tool to detect MitM attacks on SSL/TLS and localize their...

    Provided By Technische Universitat Ilmenau

  • White Papers // May 2012

    Bounds on Optimal Power Minimization and Rate Balancing in the Satellite Downlink

    The authors focus on the design of linear beamforming based on Quality-of-Service (QoS) power minimization and rate balancing in the DownLink (DL) of a satellite communication system with mobile and static users. Since only the rank-one covariance matrices of the channels to mobile users are known, they introduce average rate...

    Provided By Technische Universitat Ilmenau

  • White Papers // Mar 2012

    Server-sided Automatic Map Transformation in RoboEarth

    RoboEarth aims at providing a distributed cloud-based web platform from robots for robots that is publicly accessible and enables robots to autonomously share knowledge among each other and to generate new knowledge from previously stored data. As a result robots don't have to gain the same knowledge over and over...

    Provided By Technische Universitat Ilmenau

  • White Papers // Dec 2011

    Computational Complexity Analysis of Advanced Physical Layers Based on Multicarrier Modulation

    In this paper, the authors thoroughly analyze the computational effort necessary to implement a multicarrier based physical layer for wireless communications. They consider two variations of this modulation concept, namely traditional Cyclic Prex based Orthogonal Frequency Division Multiplexing (CP-OFDM) and Filter Bank Based MultiCarrier (FBMC) systems. First, they give the...

    Provided By Technische Universitat Ilmenau

  • White Papers // Oct 2011

    Innovation, Society and Business: Internet-Based Business Models and Their Implications

    The term business model became popular with the rise of the Internet and electronic businesses as a means to explain how an organization works. With innovations also the way how customers interact with firms and thus with their products has changed, leading to a world, where companies compete on the...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jul 2011

    Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P

    I2P is one of the most widely used anonymizing peer-to-peer networks on the internet today. Like tor, it uses onion routing to build tunnels between peers as the basis for providing anonymous communication channels. Unlike tor, I2P integrates a range of anonymously hosted services directly with the platform. This paper...

    Provided By Technische Universitat Ilmenau

  • White Papers // May 2011

    Short-Message Quantize-Forward Network Coding

    Recent work for single-relay channels shows that Quantize-Forward (QF) with long-message encoding achieves the same reliable rates as Compress-Forward (CF) with short-message encoding. It is shown that short-message QF with backward or pipelined (sliding-window) decoding also achieves the same rates. Similarly, for many relays and sources, short-message QF with backward...

    Provided By Technische Universitat Ilmenau

  • White Papers // Apr 2011

    Upper Bound to Interference Coordination With Channel State Information Outdating

    The authors consider the network sum rate maximization in the downlink of a cellular system based on the spatial channel model of the 3GPP MIMO urban macro cell with multiple antenna base stations and single antenna mobile devices. They formulate an upper bound to the kind of cooperation, where each...

    Provided By Technische Universitat Ilmenau

  • White Papers // Nov 2010

    MLSE and MMSE Subchannel Equalization for Filter Bank Based Multicarrier Systems: Coded and Uncoded Results

    Filter Bank Based Multi-Carrier (FBMC) systems appears to be the best choice to replace Cyclic Prefix (CP) based Orthogonal Frequency Division Multiplexing (OFDM) as the physical layer of future wireless communications devices. Some equalizer solutions for FBMC systems already exist. Among them, the equalizers Minimizing the Mean Square Error (MMSE)...

    Provided By Technische Universitat Ilmenau

  • White Papers // Nov 2010

    Energy-Aware Task Allocation for Network-on-Chip Based Heterogeneous Multiprocessor Systems

    Energy-efficiency is becoming one of the most critical issues in embedded system design. In Network-on-Chip (NoC) based heterogeneous multiprocessor Systems, the energy consumption is influenced dramatically by task allocation schemes. Although various approaches are proposed to allocate tasks in an energy-efficient way, existing paper does not well explore the tradeoff...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jul 2010

    Hardware-Aware Model-Driven Software Development

    Acquisition of sensor data and generation of actuator control signals are two key properties of embedded systems. It is in the nature of these tasks that their realization is hardware-dependent and involves low level program code that is usually implemented manually. Typical requirements in this context are the actual implementation...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jun 2010

    Channel-Matched Trellis Codes for Finite-State Intersymbol-Interference Channels

    This paper addresses the optimization of constrained stationary Markov input processes which achieve high information rates on Inter-Symbol-Interference (ISI) channels. The considered Markov processes define an optimized subset of equiprobable input symbols for each channel state and are thus uniquely described by the set of branches in a trellis section....

    Provided By Technische Universitat Ilmenau

  • White Papers // Apr 2010

    Distributed Management of Contextual Affinities in Context-Aware Systems

    In context-aware computing, distributed information about entities, such as people, places and objects, is captured and made available to applications, which utilize this context. With contexts from multiple entities available, the degree of alikeness of those contexts poses an interesting piece of information. The authors have tackled the issue of...

    Provided By Technische Universitat Ilmenau

  • White Papers // Apr 2010

    OFDM Receivers With Iterative Nonlinear Distortion Cancellation

    The authors propose two practical schemes for the cancellation of nonlinear distortions caused by the Power Amplifiers (PA) in Orthogonal Frequency Division Multiplexing (OFDM) systems. The algorithms are iterative and located at the receiver. They utilize a soft channel decoder to improve the capabilities of the distortion estimation and relay...

    Provided By Technische Universitat Ilmenau

  • White Papers // Feb 2010

    Formal Modeling of Safety Requirements in the Model-Driven Development of Safety Critical Embedded Systems

    Safety requirements are a very important artifact in the development of safety critical embedded systems. They are usually identified during safety analyses and are used by experts as a basis for the correct selection and implementation of safety mechanisms. Various safety analysis research groups have worked on formal modeling of...

    Provided By Technische Universitat Ilmenau

  • White Papers // Feb 2010

    Transceiver Design in Multiuser MISO Systems With Imperfect Transmit CSI

    Multiple transmit antennas can be employed in a downlink channel to serve multiple users under the assumption of perfect Channel State Information (CSI) of all users at the base station. In practice, however, the channel knowledge available at the base station is not perfect. For instance, in case of a...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jan 2010

    Adapting the Wireless Carrier Sensing for VANETs

    Vehicular Ad-Hoc NETworks (VANETs) aim at preventing accidents by providing more information to the drivers than they can visually perceive on their own. Communication according to IEEE 802.11p foreseen for VANETs allows for ranges of up to 1 km. However, this range can strongly be degraded by other distant vehicles...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jul 2009

    Achievable Rates in the SIMO-Uplink/MISO Downlink of an FDD System With Imperfect CSI

    In practical systems, the available CSI for coherent transmission can not always be assumed to be perfect. For instance, in the MISO-downlink of a single-user FDD system with multiple antennas at the BS and a single antenna at the user, the available transmit CSI is actually estimated, quantized, outdated and...

    Provided By Technische Universitat Ilmenau

  • White Papers // May 2009

    A Security Requirements Approach for Web Systems

    In order to avoid the high impacts of software vulnerabilities, it is necessary to specify security requirements early in the development on a detailed level. Current approaches for security requirements engineering give insufficient support for refining high-level requirements to a concrete and assessable level. Furthermore, reuse mechanisms for these detailed...

    Provided By Technische Universitat Ilmenau

  • White Papers // Apr 2009

    Bounds on the Capacity of MISO Channels With Different Types of Imperfect CSI (Theorem 3.5 Corrected)

    Consider the downlink of an isolated cell with a Base Station (BS) equipped with M multiple antennas and a single user with a single antenna. For this Multiple-Input Single-Output (MISO) channel, the capacity with perfect Channel State Information (CSI) the transmitter and receiver is known. In practice, however, it is...

    Provided By Technische Universitat Ilmenau

  • White Papers // Feb 2009

    Visual Roadmaps for Managed Enterprise Architecture Evolution

    Managing the evolution of the Enterprise Architecture (EA) is a key challenge for modern enterprises. Current approaches to address this challenge focus on EA plans, indicating projected future states of the architecture. Nevertheless, these plans neglect the role of the Information Technology (IT) project, which actually performs the transformation of...

    Provided By Technische Universitat Ilmenau

  • White Papers // Feb 2008

    Improvements in Polynomial-Time Feasibility Testing for EDF

    In this paper, the authors presents two fully polynomial-time sufficient feasibility tests for EDF when considering periodic tasks with arbitrary deadlines and preemptive scheduling on uniprocessors. Both proposed methods are proven, analytically and by means of an extensive experimental comparison, to be more accurate than known polynomial-time feasibility tests. Additionally,...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jan 2007

    Pathfinder: XQuery Compilation Techniques for Relational Database Targets

    Relational database systems are highly efficient hosts to table-shaped data. It is all the more interesting to see how a careful inspection of both, the XML tree structure as well as the W3C XQuery language definition, can turn relational databases into fast and scalable XML processors. This paper shows how...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jan 2013

    Minimum Mean Squared Error Interference Alignment

    To achieve the full multiplexing gain of MIMO interference networks at high SNRs, the interference from different transmitters must be aligned in lower-dimensional subspaces at the receivers. Recently a distributed "Max-SINR" algorithm for precoder optimization has been proposed that achieves interference alignment for sufficiently high SNRs. The authors show that...

    Provided By Technische Universitat Ilmenau

  • White Papers // May 2011

    Short-Message Quantize-Forward Network Coding

    Recent work for single-relay channels shows that Quantize-Forward (QF) with long-message encoding achieves the same reliable rates as Compress-Forward (CF) with short-message encoding. It is shown that short-message QF with backward or pipelined (sliding-window) decoding also achieves the same rates. Similarly, for many relays and sources, short-message QF with backward...

    Provided By Technische Universitat Ilmenau

  • White Papers // Apr 2013

    Short Message Noisy Network Coding

    Short message Noisy Network Coding (SNNC) differs from Noisy Network Coding (NNC) in that one transmits many short messages in blocks rather than using one long message with repetitive encoding. Several properties of SNNC are developed. First, SNNC achieves the same rates as NNC for memoryless networks where each node...

    Provided By Technische Universitat Ilmenau

  • White Papers // Dec 2012

    Data Protection in a Cloud-Enabled Smart Grid

    Today's electricity grid is evolving into the smart grid which ought to be reliable, flexible, efficient, and sustainable. To fulfill these requirements, the smart grid draws on a plenty of core technologies. Advanced Metering Infrastructure (AMI). These technologies facilitate easy and fast accumulation of different data, e.g. ne-grained meter readings....

    Provided By Technische Universitat Ilmenau

  • White Papers // Jan 2010

    Adapting the Wireless Carrier Sensing for VANETs

    Vehicular Ad-Hoc NETworks (VANETs) aim at preventing accidents by providing more information to the drivers than they can visually perceive on their own. Communication according to IEEE 802.11p foreseen for VANETs allows for ranges of up to 1 km. However, this range can strongly be degraded by other distant vehicles...

    Provided By Technische Universitat Ilmenau

  • White Papers // Apr 2010

    Distributed Management of Contextual Affinities in Context-Aware Systems

    In context-aware computing, distributed information about entities, such as people, places and objects, is captured and made available to applications, which utilize this context. With contexts from multiple entities available, the degree of alikeness of those contexts poses an interesting piece of information. The authors have tackled the issue of...

    Provided By Technische Universitat Ilmenau

  • White Papers // Apr 2009

    Bounds on the Capacity of MISO Channels With Different Types of Imperfect CSI (Theorem 3.5 Corrected)

    Consider the downlink of an isolated cell with a Base Station (BS) equipped with M multiple antennas and a single user with a single antenna. For this Multiple-Input Single-Output (MISO) channel, the capacity with perfect Channel State Information (CSI) the transmitter and receiver is known. In practice, however, it is...

    Provided By Technische Universitat Ilmenau

  • White Papers // Feb 2010

    Transceiver Design in Multiuser MISO Systems With Imperfect Transmit CSI

    Multiple transmit antennas can be employed in a downlink channel to serve multiple users under the assumption of perfect Channel State Information (CSI) of all users at the base station. In practice, however, the channel knowledge available at the base station is not perfect. For instance, in case of a...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jun 2010

    Channel-Matched Trellis Codes for Finite-State Intersymbol-Interference Channels

    This paper addresses the optimization of constrained stationary Markov input processes which achieve high information rates on Inter-Symbol-Interference (ISI) channels. The considered Markov processes define an optimized subset of equiprobable input symbols for each channel state and are thus uniquely described by the set of branches in a trellis section....

    Provided By Technische Universitat Ilmenau

  • White Papers // Nov 2010

    MLSE and MMSE Subchannel Equalization for Filter Bank Based Multicarrier Systems: Coded and Uncoded Results

    Filter Bank Based Multi-Carrier (FBMC) systems appears to be the best choice to replace Cyclic Prefix (CP) based Orthogonal Frequency Division Multiplexing (OFDM) as the physical layer of future wireless communications devices. Some equalizer solutions for FBMC systems already exist. Among them, the equalizers Minimizing the Mean Square Error (MMSE)...

    Provided By Technische Universitat Ilmenau

  • White Papers // Apr 2011

    Upper Bound to Interference Coordination With Channel State Information Outdating

    The authors consider the network sum rate maximization in the downlink of a cellular system based on the spatial channel model of the 3GPP MIMO urban macro cell with multiple antenna base stations and single antenna mobile devices. They formulate an upper bound to the kind of cooperation, where each...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jul 2009

    Achievable Rates in the SIMO-Uplink/MISO Downlink of an FDD System With Imperfect CSI

    In practical systems, the available CSI for coherent transmission can not always be assumed to be perfect. For instance, in the MISO-downlink of a single-user FDD system with multiple antennas at the BS and a single antenna at the user, the available transmit CSI is actually estimated, quantized, outdated and...

    Provided By Technische Universitat Ilmenau

  • White Papers // Apr 2010

    OFDM Receivers With Iterative Nonlinear Distortion Cancellation

    The authors propose two practical schemes for the cancellation of nonlinear distortions caused by the Power Amplifiers (PA) in Orthogonal Frequency Division Multiplexing (OFDM) systems. The algorithms are iterative and located at the receiver. They utilize a soft channel decoder to improve the capabilities of the distortion estimation and relay...

    Provided By Technische Universitat Ilmenau

  • White Papers // Dec 2011

    Computational Complexity Analysis of Advanced Physical Layers Based on Multicarrier Modulation

    In this paper, the authors thoroughly analyze the computational effort necessary to implement a multicarrier based physical layer for wireless communications. They consider two variations of this modulation concept, namely traditional Cyclic Prex based Orthogonal Frequency Division Multiplexing (CP-OFDM) and Filter Bank Based MultiCarrier (FBMC) systems. First, they give the...

    Provided By Technische Universitat Ilmenau

  • White Papers // May 2012

    Bounds on Optimal Power Minimization and Rate Balancing in the Satellite Downlink

    The authors focus on the design of linear beamforming based on Quality-of-Service (QoS) power minimization and rate balancing in the DownLink (DL) of a satellite communication system with mobile and static users. Since only the rank-one covariance matrices of the channels to mobile users are known, they introduce average rate...

    Provided By Technische Universitat Ilmenau

  • White Papers // May 2013

    Protecting PUF Error Correction by Codeword Masking

    One of the main applications of Physical Unclonable Functions (PUFs) is unique key generation. While the advantages of PUF-based key extraction and embedding have been shown in several papers, physical attacks on it have gained only little interest until now. In this paper, the authors demonstrate the feasibility of a...

    Provided By Technische Universitat Ilmenau

  • White Papers // Mar 2012

    Server-sided Automatic Map Transformation in RoboEarth

    RoboEarth aims at providing a distributed cloud-based web platform from robots for robots that is publicly accessible and enables robots to autonomously share knowledge among each other and to generate new knowledge from previously stored data. As a result robots don't have to gain the same knowledge over and over...

    Provided By Technische Universitat Ilmenau

  • White Papers // Feb 2010

    Formal Modeling of Safety Requirements in the Model-Driven Development of Safety Critical Embedded Systems

    Safety requirements are a very important artifact in the development of safety critical embedded systems. They are usually identified during safety analyses and are used by experts as a basis for the correct selection and implementation of safety mechanisms. Various safety analysis research groups have worked on formal modeling of...

    Provided By Technische Universitat Ilmenau

  • White Papers // May 2014

    Reliability-Aware Design Optimization for Multiprocessor Embedded Systems

    In this paper the authors present an approach for the reliability-aware design optimization of real-time systems on multi-processor platforms. The optimization is based on an extension of well accepted fault- and process-models. They combine utilization of hardware replication and software re-execution techniques to tolerate transient faults. A System Fault Tree...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jul 2010

    Hardware-Aware Model-Driven Software Development

    Acquisition of sensor data and generation of actuator control signals are two key properties of embedded systems. It is in the nature of these tasks that their realization is hardware-dependent and involves low level program code that is usually implemented manually. Typical requirements in this context are the actual implementation...

    Provided By Technische Universitat Ilmenau

  • White Papers // Nov 2010

    Energy-Aware Task Allocation for Network-on-Chip Based Heterogeneous Multiprocessor Systems

    Energy-efficiency is becoming one of the most critical issues in embedded system design. In Network-on-Chip (NoC) based heterogeneous multiprocessor Systems, the energy consumption is influenced dramatically by task allocation schemes. Although various approaches are proposed to allocate tasks in an energy-efficient way, existing paper does not well explore the tradeoff...

    Provided By Technische Universitat Ilmenau

  • White Papers // Nov 2013

    Applications of Interactive Proof to Data Flow Analysis and Security

    The authors show how to formalize a small imperative programming language in the theorem prover Isabelle/HOL, how to define its semantics, and how to prove properties about the language, its type systems, and a number of data-flow analyses. The emphasis is not on formalizing a complex language deeply, but to...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jan 2014

    Schema-Based Scheduling of Event Processors and Buffer Minimization for Queries on Structured Data Streams

    The authors introduce an extension of the XQuery language, FluX that supports event-based query processing and the conscious handling of main memory buffers. Purely event-based queries of this language can be executed on streaming XML data in a very direct way. They then develop an algorithm that allows to efficiently...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jul 2013

    Spatial and Temporal Isolation of Virtual CAN Controllers

    Virtualization is a key technology to enable the use of multi-core processors in automotive embedded systems. For side-by-side execution of mixed-criticality applications that access shared communication infrastructures, a secure and safe virtualization of I/O devices is required, which features a complete spatial and temporal isolation of individual virtual interfaces. The...

    Provided By Technische Universitat Ilmenau

  • White Papers // Feb 2009

    Visual Roadmaps for Managed Enterprise Architecture Evolution

    Managing the evolution of the Enterprise Architecture (EA) is a key challenge for modern enterprises. Current approaches to address this challenge focus on EA plans, indicating projected future states of the architecture. Nevertheless, these plans neglect the role of the Information Technology (IT) project, which actually performs the transformation of...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jul 2013

    An Evaluation of Strict Timestamp Ordering Concurrency Control for Main-Memory Database Systems

    With the fundamental change of hardware technology, main-memory database systems have emerged as the next generation of DBMS. Thus, new methods to execute transactions in a serial, lock-free mode have been investigated and successfully employed, for instance in H-Store or HyPer. Although these techniques allow for unprecedentedly high throughput for...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jan 2007

    Pathfinder: XQuery Compilation Techniques for Relational Database Targets

    Relational database systems are highly efficient hosts to table-shaped data. It is all the more interesting to see how a careful inspection of both, the XML tree structure as well as the W3C XQuery language definition, can turn relational databases into fast and scalable XML processors. This paper shows how...

    Provided By Technische Universitat Ilmenau

  • White Papers // Feb 2008

    Improvements in Polynomial-Time Feasibility Testing for EDF

    In this paper, the authors presents two fully polynomial-time sufficient feasibility tests for EDF when considering periodic tasks with arbitrary deadlines and preemptive scheduling on uniprocessors. Both proposed methods are proven, analytically and by means of an extensive experimental comparison, to be more accurate than known polynomial-time feasibility tests. Additionally,...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jul 2011

    Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P

    I2P is one of the most widely used anonymizing peer-to-peer networks on the internet today. Like tor, it uses onion routing to build tunnels between peers as the basis for providing anonymous communication channels. Unlike tor, I2P integrates a range of anonymously hosted services directly with the platform. This paper...

    Provided By Technische Universitat Ilmenau

  • White Papers // May 2009

    A Security Requirements Approach for Web Systems

    In order to avoid the high impacts of software vulnerabilities, it is necessary to specify security requirements early in the development on a detailed level. Current approaches for security requirements engineering give insufficient support for refining high-level requirements to a concrete and assessable level. Furthermore, reuse mechanisms for these detailed...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jan 2013

    A Method for Constructing Enterprise-wide Access Views on Business Objects

    Modern application landscapes consist of a multitude of inter-connected business applications exchanging data in manifold ways. These business applications are used by employees who take on several organizational roles. However, when broadening the scope to an enterprise-wide perspective, lack of clarity and uncertainty prevail regarding the questions which roles have...

    Provided By Technische Universitat Ilmenau

  • White Papers // Jun 2012

    X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle

    Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-Middle (MitM) attacks on SSL/TLS, very little proof exists in the public realm. In this paper, the authors report on the development and deployment of Crossbear, a tool to detect MitM attacks on SSL/TLS and localize their...

    Provided By Technische Universitat Ilmenau

  • White Papers // Dec 2012

    Automotive Proxy-Based Security Architecture for CE Device Integration

    Increasing adoption of Consumer Electronic (CE) devices in the automotive world encourages car makers to propose new CE-related features each year. However, car complexity and security concerns slow down this process. The ubiquitous and personal nature of such devices represents a real threat for car IT systems. The authors believe...

    Provided By Technische Universitat Ilmenau

  • White Papers // Oct 2011

    Innovation, Society and Business: Internet-Based Business Models and Their Implications

    The term business model became popular with the rise of the Internet and electronic businesses as a means to explain how an organization works. With innovations also the way how customers interact with firms and thus with their products has changed, leading to a world, where companies compete on the...

    Provided By Technische Universitat Ilmenau