University Circle Inc.

Displaying 1-16 of 16 results

  • White Papers // Dec 2012

    A Bloom Filter Based Model for Decentralised Authorisation

    Access control systems such as are intended to provide a decentralized approach to constructing and interpreting authorization relationships between principals (public keys). A decentralized authorization mechanism is proposed that uses Bloom filters to implement authorization delegation. This lightweight mechanism is unlike conventional approaches that typically rely on public key certificates...

    Provided By University Circle Inc.

  • White Papers // Aug 2012

    Multiple Sink and Relay Placement in Wireless Sensor Networks

    Wireless sensor networks are subject to failures. Deployment planning should ensure that when a sink or sensor node fails, the remaining network can still be connected, and so may require placing multiple sinks and relay nodes in addition to sensors. For network performance requirements, there may also be path-length constraints...

    Provided By University Circle Inc.

  • White Papers // Jul 2012

    Learning Individual Thermal Comfort Using Robust Locally Weighted Regression With Adaptive Bandwidth

    Ensuring that the thermal comfort conditions in offices are in line with the preferences of the occupants, is one of the main aims of a heating/cooling control system, in order to save energy, increase productivity and reduce sick leave days. The industry standard approach for modelling occupant comfort is Fanger's...

    Provided By University Circle Inc.

  • White Papers // Jun 2012

    Analysis of Smartphone User Mobility Traces for Opportunistic Data Collection

    Considering that Smartphones are tightly-coupled with their users, the interaction between Smartphones and wireless sensor networks will play a very important role in pervasive computing for improving the people daily life. Instead of using Smartphones to access the services provided by various wire-less sensor networks, the authors focus on using...

    Provided By University Circle Inc.

  • White Papers // May 2012

    Restoring Wireless Sensor Network Connectivity in Damaged Environments

    A wireless sensor network can become partitioned due to node failure, requiring the deployment of additional relay nodes in order to restore network connectivity. This introduces an optimisation problem involving a tradeoff between the number of additional nodes that are required and the costs of moving through the sensor field...

    Provided By University Circle Inc.

  • White Papers // Mar 2012

    SDC: Scalable Description Coding for Adaptive Streaming Media

    Video compression techniques enable adaptive media streaming over heterogeneous links to end-devices. Scalable Video Coding (SVC) and Multiple Description Coding (MDC) represent well-known techniques for video compression with distinct characteristics in terms of bandwidth efficiency and resiliency to packet loss. In this paper, the authors present Scalable Description Coding (SDC),...

    Provided By University Circle Inc.

  • White Papers // Nov 2011

    HTTPEP: A HTTP Performance Enhancing Proxy for Satellite Systems

    Broadband satellites enable Internet access for remote communities and niche markets such as ships and airplanes. However, their inherent characteristics, such as long delays and limited resources, significantly degrade the end-user's web browsing quality-of-experience. In this paper, the authors propose a novel HTTP Performance Enhancing Proxy (PEP) that accelerates web-browsing...

    Provided By University Circle Inc.

  • White Papers // Aug 2011

    Towards an Automated Client-Side Framework for Evaluating HTTP/TCP Performance

    Many different existing technologies and techniques have been developed to accelerate Hyper Text Transfer Protocol (HTTP) with the aim of improving the end-user's web browsing experience. However, there is no standard methodology for evaluating HTTP performance or for the evaluation of a given HTTP acceleration technology in a multi-user scenario....

    Provided By University Circle Inc.

  • White Papers // Jul 2011

    Offset-QAM Based Coherent WDM for Spectral Efficiency Enhancement

    Optically multiplexed multi-carrier systems with channel spacing reduced to the symbol rate per carrier are highly susceptible to inter-channel crosstalk, which places stringent requirements for the specifications of system components and hinders the use of high-level formats. In this paper, the authors investigate the performance benefits of using offset 4-,...

    Provided By University Circle Inc.

  • White Papers // Mar 2011

    A Graph Theoretical Approach for Network Coding in Wireless Body Area Networks

    Network coding has been widely studied in the last decade since the publication of the seminal paper in which it was shown that significant gains could be achieved in a multicast transmission if coding of data is used in addition to simply routing. Modern medical wireless systems, such as Wireless...

    Provided By University Circle Inc.

  • White Papers // Feb 2011

    HTTP Acceleration Over High Latency Links

    Broadband satellites enable Internet access for remote communities and niche markets such as ships and airplanes. However, their inherent characteristics, such as long delays and limited resources, significantly degrade the user quality-of-experience. In this paper, the authors propose a novel HTTP Performance Enhancing Proxy (PEP) that accelerates web-browsing and improves...

    Provided By University Circle Inc.

  • White Papers // Jul 2009

    A Service Oriented Architecture for Building Performance Monitoring

    Information technology plays a key role in the everyday operation of buildings and campuses. Many proprietary technologies and methodologies can assist in effective Building Performance Monitoring (BPM) and efficient managing of building resources. The integration of related tools like energy simulator packages, facility, energy and building management systems, and enterprise...

    Provided By University Circle Inc.

  • White Papers // Jul 2009

    Applying Concept-Driven Engineering for Business Process Specifications

    This paper presents the principles of concept-driven engineering and the Concept-Manager tool as an implementation of these principles. Concept-Driven Engineering is capable of eleminating inconsistencies and redundancy that occur within projects, i.e. in the software-development process to increase quality, decrease time to market, and increase flexibility. This method is based...

    Provided By University Circle Inc.

  • White Papers // Aug 2008

    The Changing Role of Management Accountants; Evidence From the Implementation of ERP Systems in Large Organisations

    Enterprise Resource Planning (ERP) Systems are among the most topical subjects in the current business environment. Organizations implement these systems to become more efficient as well as integrate and modernize the whole business. This paper examines the impact of ERP systems on the changing role of the management accountant. The...

    Provided By University Circle Inc.

  • White Papers // Jun 2008

    Configuring Storage Area Networks Using Mandatory Security

    Storage Area Networks (SAN) are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both environments the network and the storage has to be configured to ensure that the data is maintained securely and can be delivered...

    Provided By University Circle Inc.

  • White Papers // Sep 2007

    Correlation Power Analysis of Large Word Sizes

    Side channel analysis can be used to derive secret/private keys used in naive implementations of cryptographic algorithms. Such attacks typically involve demonstrating the relationship between the data being manipulated by a microprocessor or FPGA, and the instantaneous power consumption of the device. When statistical power attacks are applied to software...

    Provided By University Circle Inc.

  • White Papers // Mar 2011

    A Graph Theoretical Approach for Network Coding in Wireless Body Area Networks

    Network coding has been widely studied in the last decade since the publication of the seminal paper in which it was shown that significant gains could be achieved in a multicast transmission if coding of data is used in addition to simply routing. Modern medical wireless systems, such as Wireless...

    Provided By University Circle Inc.

  • White Papers // Jul 2011

    Offset-QAM Based Coherent WDM for Spectral Efficiency Enhancement

    Optically multiplexed multi-carrier systems with channel spacing reduced to the symbol rate per carrier are highly susceptible to inter-channel crosstalk, which places stringent requirements for the specifications of system components and hinders the use of high-level formats. In this paper, the authors investigate the performance benefits of using offset 4-,...

    Provided By University Circle Inc.

  • White Papers // Aug 2012

    Multiple Sink and Relay Placement in Wireless Sensor Networks

    Wireless sensor networks are subject to failures. Deployment planning should ensure that when a sink or sensor node fails, the remaining network can still be connected, and so may require placing multiple sinks and relay nodes in addition to sensors. For network performance requirements, there may also be path-length constraints...

    Provided By University Circle Inc.

  • White Papers // Jul 2012

    Learning Individual Thermal Comfort Using Robust Locally Weighted Regression With Adaptive Bandwidth

    Ensuring that the thermal comfort conditions in offices are in line with the preferences of the occupants, is one of the main aims of a heating/cooling control system, in order to save energy, increase productivity and reduce sick leave days. The industry standard approach for modelling occupant comfort is Fanger's...

    Provided By University Circle Inc.

  • White Papers // May 2012

    Restoring Wireless Sensor Network Connectivity in Damaged Environments

    A wireless sensor network can become partitioned due to node failure, requiring the deployment of additional relay nodes in order to restore network connectivity. This introduces an optimisation problem involving a tradeoff between the number of additional nodes that are required and the costs of moving through the sensor field...

    Provided By University Circle Inc.

  • White Papers // Jun 2012

    Analysis of Smartphone User Mobility Traces for Opportunistic Data Collection

    Considering that Smartphones are tightly-coupled with their users, the interaction between Smartphones and wireless sensor networks will play a very important role in pervasive computing for improving the people daily life. Instead of using Smartphones to access the services provided by various wire-less sensor networks, the authors focus on using...

    Provided By University Circle Inc.

  • White Papers // Mar 2012

    SDC: Scalable Description Coding for Adaptive Streaming Media

    Video compression techniques enable adaptive media streaming over heterogeneous links to end-devices. Scalable Video Coding (SVC) and Multiple Description Coding (MDC) represent well-known techniques for video compression with distinct characteristics in terms of bandwidth efficiency and resiliency to packet loss. In this paper, the authors present Scalable Description Coding (SDC),...

    Provided By University Circle Inc.

  • White Papers // Nov 2011

    HTTPEP: A HTTP Performance Enhancing Proxy for Satellite Systems

    Broadband satellites enable Internet access for remote communities and niche markets such as ships and airplanes. However, their inherent characteristics, such as long delays and limited resources, significantly degrade the end-user's web browsing quality-of-experience. In this paper, the authors propose a novel HTTP Performance Enhancing Proxy (PEP) that accelerates web-browsing...

    Provided By University Circle Inc.

  • White Papers // Aug 2011

    Towards an Automated Client-Side Framework for Evaluating HTTP/TCP Performance

    Many different existing technologies and techniques have been developed to accelerate Hyper Text Transfer Protocol (HTTP) with the aim of improving the end-user's web browsing experience. However, there is no standard methodology for evaluating HTTP performance or for the evaluation of a given HTTP acceleration technology in a multi-user scenario....

    Provided By University Circle Inc.

  • White Papers // Feb 2011

    HTTP Acceleration Over High Latency Links

    Broadband satellites enable Internet access for remote communities and niche markets such as ships and airplanes. However, their inherent characteristics, such as long delays and limited resources, significantly degrade the user quality-of-experience. In this paper, the authors propose a novel HTTP Performance Enhancing Proxy (PEP) that accelerates web-browsing and improves...

    Provided By University Circle Inc.

  • White Papers // Sep 2007

    Correlation Power Analysis of Large Word Sizes

    Side channel analysis can be used to derive secret/private keys used in naive implementations of cryptographic algorithms. Such attacks typically involve demonstrating the relationship between the data being manipulated by a microprocessor or FPGA, and the instantaneous power consumption of the device. When statistical power attacks are applied to software...

    Provided By University Circle Inc.

  • White Papers // Aug 2008

    The Changing Role of Management Accountants; Evidence From the Implementation of ERP Systems in Large Organisations

    Enterprise Resource Planning (ERP) Systems are among the most topical subjects in the current business environment. Organizations implement these systems to become more efficient as well as integrate and modernize the whole business. This paper examines the impact of ERP systems on the changing role of the management accountant. The...

    Provided By University Circle Inc.

  • White Papers // Dec 2012

    A Bloom Filter Based Model for Decentralised Authorisation

    Access control systems such as are intended to provide a decentralized approach to constructing and interpreting authorization relationships between principals (public keys). A decentralized authorization mechanism is proposed that uses Bloom filters to implement authorization delegation. This lightweight mechanism is unlike conventional approaches that typically rely on public key certificates...

    Provided By University Circle Inc.

  • White Papers // Jul 2009

    A Service Oriented Architecture for Building Performance Monitoring

    Information technology plays a key role in the everyday operation of buildings and campuses. Many proprietary technologies and methodologies can assist in effective Building Performance Monitoring (BPM) and efficient managing of building resources. The integration of related tools like energy simulator packages, facility, energy and building management systems, and enterprise...

    Provided By University Circle Inc.

  • White Papers // Jul 2009

    Applying Concept-Driven Engineering for Business Process Specifications

    This paper presents the principles of concept-driven engineering and the Concept-Manager tool as an implementation of these principles. Concept-Driven Engineering is capable of eleminating inconsistencies and redundancy that occur within projects, i.e. in the software-development process to increase quality, decrease time to market, and increase flexibility. This method is based...

    Provided By University Circle Inc.

  • White Papers // Jun 2008

    Configuring Storage Area Networks Using Mandatory Security

    Storage Area Networks (SAN) are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both environments the network and the storage has to be configured to ensure that the data is maintained securely and can be delivered...

    Provided By University Circle Inc.