University College Dublin

Displaying 1-40 of 57 results

  • White Papers // May 2013

    Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme with Capacitors

    In a paper published few days ago, Grigoriev and Shpilrain propose to build a system for transmission of information without a shared secret, or essentially a sort of public key cryptosystem, based on properties of physical systems. Few days ago Grigoriev and Shpilrain have proposed to build a system for...

    Provided By University College Dublin

  • White Papers // Jan 2013

    Energy-Aware Adaptive Network Resource Management

    Resource over-provisioning is common practice in network infrastructures. Coupled with energy unaware networking protocols, this can lead to periods of resource underutilization and constant energy consumption irrespective of the traffic load conditions. Driven by the rising cost of energy - and therefore OPEX - and increasing environmental consciousness, research in...

    Provided By University College Dublin

  • White Papers // Jan 2013

    Automated Engineering of e-Business Processes the RosettaNet Case Study

    For more than twenty years, process automation has been successfully used to improve efficiency within companies. The resources involved in the production of goods and services were predominantly internal, and such situation was reflected by process models and execution technologies. With business models now shifting towards a more cooperative approach,...

    Provided By University College Dublin

  • White Papers // Nov 2012

    On the Dynamic Configuration of Business Process Models

    Business Process Models are a relevant input for the development of information systems. Since processes are performed in increasingly dynamic business environments, the processes are required to be flexible and dynamic as well, adapting to environmental changes. Thus, it is essential to properly represent variability in Business Process Models. Moreover,...

    Provided By University College Dublin

  • White Papers // Sep 2012

    Compress-and-Forward on a Multiaccess Relay Channel With Computation at the Receiver

    The authors study a system in which two sources communicate with a destination with the help of a half-duplex relay. They consider a decoding strategy, based on the compute-and-forward strategy, in which the destination decodes two integer-valued linear combinations that relate the transmitted code-words. In this strategy, the relay compresses...

    Provided By University College Dublin

  • White Papers // Sep 2012

    The AGAVE Approach for Network Virtualization: Differentiated Services Delivery

    In this paper, the authors describe a new paradigm to realize network virtualization and define two novel concepts: network planes and parallel Internets to achieve service differentiation. These concepts are packaged in a technology-agnostic and a multi-dimensional approach for the delivery of Internet Protocol (IP) service differentiation, both intra- and...

    Provided By University College Dublin

  • White Papers // Sep 2012

    Internet-Scale Content Mediation in Information-Centric Networks

    Given that the vast majority of Internet interactions relate to content access and delivery, recent research has pointed to a potential paradigm shift from the current host-centric Internet model to an information-centric one. In information-centric networks named content is accessed directly, with the best content copy delivered to the requesting...

    Provided By University College Dublin

  • White Papers // May 2012

    Statistical Eigenmode SDMA Transmission for a Two-User Downlink

    This paper proposes a Statistical-Eigenmode Space Division Multiple-Access (SE-SDMA) transmission for a two-user downlink system where two transmit antennas are equipped at the base station and each mobile user has one receive antenna, assuming that only statistical Channel State Information (CSI) is available at the transmitter. By maximizing a lower...

    Provided By University College Dublin

  • White Papers // May 2012

    Valley-Free Violation in Internet Routing - Analysis Based on BGP Community Data

    The valley-free rule defines patterns of routing paths that allow the Internet Autonomous Systems (AS) to minimize their routing costs through selective announcement of BGP routes. The valley-free rule has been widely perceived as a universal property of the Internet BGP routing that is only violated due to transient configuration...

    Provided By University College Dublin

  • White Papers // May 2012

    A Verification Methodology for the Detection of Spectrally Efficient FDM Signals Generated Using Reconfigurable Hardware

    Simulation, using a model of a system or process, is widely accepted as a method of qualification and evaluation of complex systems. The success of a simulation depends on the accuracy of user defined values used to model parameters, which are gathered by analytical or empirical methods. In situations where...

    Provided By University College Dublin

  • White Papers // May 2012

    Make Mine a Quadruple: Strengthening the Security of Graphical One-Time PIN Authentication

    Secure and reliable authentication is an essential prerequisite for many online systems, yet achieving this in a way which is acceptable to customers remains a challenge. GrIDsure, a one-time PIN scheme using random grids and personal patterns, has been proposed as a way to overcome some of these challenges. The...

    Provided By University College Dublin

  • White Papers // Mar 2012

    The Role of Artificial Intelligence in Software Engineering

    There has been a recent surge in interest in the application of Artificial Intelligence (AI) techniques to Software Engineering (SE) problems. The work is typified by recent advances in Search Based Software Engineering, but also by long established work in Probabilistic reasoning and machine learning for Software Engineering. This paper...

    Provided By University College Dublin

  • White Papers // Mar 2012

    Optimal Pilot Based Frequency-Dependent I/Q Imbalance Compensation for Wideband Direct-Conversion Transmitters

    Current trends in low-cost and low power consumption transmitters in state-of-the-art wireless systems is to use the direct-conversion principle. Such transmitters, however, suffer severely from the I/Q imbalance effect, which introduces mirror-frequency interference and degrades data detection. This paper proposes a novel method for frequency-dependent I/Q imbalance estimation and compensation....

    Provided By University College Dublin

  • White Papers // Jan 2012

    The Future of Spatial Data Infrastructures

    In this paper, the authors address two central questions relating to the future of Spatial Data Infrastructures (SDIs); where have the user got to now? and where should go from here? The answers to the first question are to be found in a review of the main milestones of SDI...

    Provided By University College Dublin

  • White Papers // Aug 2011

    Towards Decentralized and Adaptive Network Resource Management

    Current practices for managing resources in fixed networks rely on off-line approaches, which can be sub-optimal in the face of changing or unpredicted traffic demand. To cope with the limitations of these off-line configurations new Traffic Engineering (TE) schemes that can adapt to network and traffic dynamics are required. In...

    Provided By University College Dublin

  • White Papers // Mar 2011

    Making the Case for MORTO: Multi Objective Regression Test Optimization

    This paper argues that regression test optimization problems such as selection and prioritization require multi objective optimization in order to adequately cater for real world regression testing scenarios. The paper presents several examples of costs and values that could be incorporated into such a Multi Objective Regression Test Optimization (MORTO)...

    Provided By University College Dublin

  • White Papers // Feb 2011

    On the Scalability of Carrier-Grade Mesh Network Architectures

    The increasing popularity of multi-hop wireless mesh networks, augmented with specific mechanisms required to support carrier-grade services, makes them an attractive alternative to classical backhaul solutions for network operators. However, current mesh deployments are typically small-sized, and, under real-time service requirements, it is yet unclear if they could scale to...

    Provided By University College Dublin

  • White Papers // Feb 2011

    Refactoring as Testability Transformation

    This paper briefly reviews the theory of testability transformation and outlines its implications for and relationship to refactoring for testing. The paper introduces testability refactorings, a subclass of testability transformations and discusses possible examples of testability refactorings. Several approaches to testability refactoring are also introduced. These include the novel concept...

    Provided By University College Dublin

  • White Papers // Jan 2011

    Putting Meaning Into the Network: Some Semantic Issues for the Design of Autonomic Communications Systems

    Traditional network abstractions follow a layered model in which a sub-system interacts with other network components through very narrow interfaces. The authors content that this model is weak both in providing clear models of end-to-end properties and allowing adaptation to the more abstract properties of systems. They propose instead a...

    Provided By University College Dublin

  • White Papers // Sep 2010

    Risk Attitudes As An Independent Predictor Of Debt

    This paper examines how attitudes to risk relate to other psychological constructs of personality and consideration of future consequences (a proxy for time preferences) and how risk attitudes relate to credit behaviour and debt holdings. There is a small correlation between risk attitudes and consideration of future consequences. As regards...

    Provided By University College Dublin

  • White Papers // Sep 2010

    General Perfectly Secure Message Transmission Using Linear Codes

    The authors study Perfectly Secure Message Transmission (PSMT) from a sender S to a receiver R in the general adversary model. In this model, instead of being bounded by a threshold, the Byzantine adversary in a network is characterized by an adversary structure. By regarding monotone general access structures as...

    Provided By University College Dublin

  • White Papers // Sep 2010

    Behind-the-Scenes of IEEE 802.11a Based Multi-Radio Mesh Networks: A Measurement Driven Evaluation of Inter-Channel Interference

    To successfully develop IEEE 802.11a based wireless mesh network solutions that can achieve the reliability and capacities required to offer high quality triple play services the use of multiple radios in each mesh node is essential. Unfortunately, the co-location of multiple antennas in a single device leads to a number...

    Provided By University College Dublin

  • White Papers // Sep 2010

    Short Pairing-based Non-interactive Zero-Knowledge Arguments

    The authors construct non-interactive zero-knowledge arguments for circuit satisfiability with perfect completeness, perfect zero-knowledge and computational soundness. The non-interactive zero-knowledge arguments have sub-linear size and very efficient public verification. The size of the non-interactive zero-knowledge arguments can even be reduced to a constant number of group elements if they allow...

    Provided By University College Dublin

  • White Papers // Aug 2010

    Scientific Advisory Boards As Social Resources Exploring Their Role, Use, And Impact In The Market Development Activities Of New Ventures

    This paper in progress paper formulates a research agenda for exploring new ventures' scientific advisory boards as a valuable source of social capital. While the human capital of such boards and the value of their relationships within the broader scientific community have been investigated in a small number of recent...

    Provided By University College Dublin

  • White Papers // Aug 2010

    Development Of New Ventures Through Time-A Theoretical Account

    This paper sets out to conceptually explore the origin, growth and development of a new venture. This new venture development process is explored using ideas from the IMP, Penrose and Loasby and insights from entrepreneurial literature. This paper to frame the discussion loosely uses an ARA frame to discuss this...

    Provided By University College Dublin

  • White Papers // Aug 2010

    Short Non-interactive Zero-Knowledge Proofs

    The authors show that probabilistically checkable proofs can be used to shorten non-interactive zero-knowledge proofs. They obtain publicly verifiable non-interactive zero-knowledge proofs for circuit satisfiability with adaptive and unconditional soundness where the size grows quasi-linearly in the number of gates. The zero-knowledge property relies on the existence of trapdoor permutations,...

    Provided By University College Dublin

  • White Papers // Jun 2010

    Securing Wireless Sensor Networks: Introducing ASLAN - A Secure Lightweight Architecture for WSNs

    Wireless sensor networks consist of many small, inexpensive devices that have constraints in coverage, bandwidth, storage resources, communications ability and processing power. Therefore security issues are a critical concern due to possible exposure to malicious activity and potential threats. As a result of the physical constraints in sensor nodes, traditional...

    Provided By University College Dublin

  • White Papers // Jun 2010

    Why Source Code Analysis and Manipulation Will Always Be Important

    This paper makes a case for source code analysis and manipulation. The paper argues that it will not only remain important, but that its importance will continue to grow. This argument is partly based on the 'Law' of tendency to executability, which the paper introduces. The paper also makes a...

    Provided By University College Dublin

  • White Papers // Jun 2010

    Female Labour Supply And Divorce: New Evidence From Ireland

    If participation in the labor market helps to secure women's outside options in the case of divorce/separation, an increase in the perceived risk of marital dissolution may accelerate the increase in female labor supply. This simple prediction has been tested in the literature using time and/or spatial variation in divorce...

    Provided By University College Dublin

  • White Papers // Apr 2010

    The True Cost of Unusable Password Policies: Password Use in the Wild

    Despite a growing number of graphical and biometric authentication mechanisms, passwords remain the most familiar and commonly-used form of user authentication in organizational settings. In this paper, the authors investigate the impact of passwords, and their associated security policies, on individual users' productivity and experience. Password policies govern not only...

    Provided By University College Dublin

  • White Papers // Mar 2010

    Building Decision Trees From Decision Stumps

    Decision stumps are simple one layer decision trees using all the same settings as the typical decision trees. However, most decision stumps are not useful in prediction on their own. To produce more predictive models, a decision tree is better. Building a decision tree in SAS is much more difficult...

    Provided By University College Dublin

  • White Papers // Mar 2010

    Data Masking With Classical Ciphers

    Data masking and protection is an essential part of data processing. With easy access to data, encryption of sensitive information is now a critical part of the data process especially with respect to the new data regulations in place for many countries. While there are no explicit data encryption functions...

    Provided By University College Dublin

  • White Papers // Mar 2010

    Multi-Query Computationally-Private Information Retrieval with Constant Communication Rate

    A fundamental privacy problem in the client-server setting is the retrieval of a record from a database maintained by a server so that the computationally bounded server remains oblivious to the index of the record retrieved while the overall communication between the two parties is smaller than the database size....

    Provided By University College Dublin

  • White Papers // Mar 2010

    Network Coding With Modular Lattices

    Network coding is a tool for information transmission in networks. A network is considered to be a directed graph, where an edge from a vertex u to a vertex v is drawn, if u is able to send information directly to v. A subset of the vertices is the set...

    Provided By University College Dublin

  • White Papers // Jan 2010

    DACoRM: A Coordinated, Decentralized and Adaptive Network Resource Management Scheme

    In order to meet the requirements of emerging demanding services, network resource management functionality that is decentralized, flexible and adaptive to traffic and network dynamics is of paramount importance. In this paper, the authors describe the main mechanisms of DACoRM, a new intra-domain adaptive resource management approach for IP networks....

    Provided By University College Dublin

  • White Papers // Dec 2009

    Modelling Periodic Data Dissemination in Wireless Sensor Networks

    Epidemic-based communications, or "Gossiping", provides a robust and scalable method for maintaining a knowledge base in a sensor network faced with an unpredictable network environment. Since sensed information is often periodic in time, protocols should be able to manage multiple messages in an efficient way. The authors describe a mathematical...

    Provided By University College Dublin

  • White Papers // Dec 2009

    Containing Systemic Risk

    Systemic risk refers to the risk of financial system breakdown due to linkages between institutions. This risk cannot be assessed by looking at how individual institutions manage risks but instead requires a full understanding of how the system as a whole operates. At present, the data available to central banks...

    Provided By University College Dublin

  • White Papers // Nov 2009

    Health Savings Accounts For Small Businesses And Entrepreneurs: Shopping, Take-up And Implementation Challenges

    A combination of High Deductible Health Plans (HDHPs) and Health Savings Accounts (HSAs) holds promise for expanding health insurance for small firms. The authors provide information on HSA take-up and shopping behavior from a 2008 survey of female small business owners, revealing that the HSA marketplace can be confusing for...

    Provided By University College Dublin

  • White Papers // Nov 2009

    Self-Management of Routing on Human Proximity Networks

    Many modern network applications, including sensor networks and MANETs, have dynamic topologies that reflect processes occurring in the outside world. These dynamic processes are a challenge to traditional information dissemination techniques, as the appropriate strategy changes according to the changes in topology. The authors show how network dynamics can be...

    Provided By University College Dublin

  • White Papers // Oct 2009

    Developing Self-Managing Embedded Systems With ASSL

    The authors present a new formal approach to the implementation of embedded systems, arrived at by introducing self-management capabilities to the same. They use the ASSL (Autonomic System Specification Language) framework to approach the problem of formal specification and automatic code generation of embedded systems. Some features of ASSL help...

    Provided By University College Dublin

  • White Papers // Sep 2012

    Compress-and-Forward on a Multiaccess Relay Channel With Computation at the Receiver

    The authors study a system in which two sources communicate with a destination with the help of a half-duplex relay. They consider a decoding strategy, based on the compute-and-forward strategy, in which the destination decodes two integer-valued linear combinations that relate the transmitted code-words. In this strategy, the relay compresses...

    Provided By University College Dublin

  • White Papers // Jan 2013

    Energy-Aware Adaptive Network Resource Management

    Resource over-provisioning is common practice in network infrastructures. Coupled with energy unaware networking protocols, this can lead to periods of resource underutilization and constant energy consumption irrespective of the traffic load conditions. Driven by the rising cost of energy - and therefore OPEX - and increasing environmental consciousness, research in...

    Provided By University College Dublin

  • White Papers // Sep 2012

    Internet-Scale Content Mediation in Information-Centric Networks

    Given that the vast majority of Internet interactions relate to content access and delivery, recent research has pointed to a potential paradigm shift from the current host-centric Internet model to an information-centric one. In information-centric networks named content is accessed directly, with the best content copy delivered to the requesting...

    Provided By University College Dublin

  • White Papers // May 2013

    Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme with Capacitors

    In a paper published few days ago, Grigoriev and Shpilrain propose to build a system for transmission of information without a shared secret, or essentially a sort of public key cryptosystem, based on properties of physical systems. Few days ago Grigoriev and Shpilrain have proposed to build a system for...

    Provided By University College Dublin

  • White Papers // Jan 2012

    The Future of Spatial Data Infrastructures

    In this paper, the authors address two central questions relating to the future of Spatial Data Infrastructures (SDIs); where have the user got to now? and where should go from here? The answers to the first question are to be found in a review of the main milestones of SDI...

    Provided By University College Dublin

  • White Papers // Sep 2012

    The AGAVE Approach for Network Virtualization: Differentiated Services Delivery

    In this paper, the authors describe a new paradigm to realize network virtualization and define two novel concepts: network planes and parallel Internets to achieve service differentiation. These concepts are packaged in a technology-agnostic and a multi-dimensional approach for the delivery of Internet Protocol (IP) service differentiation, both intra- and...

    Provided By University College Dublin

  • White Papers // Mar 2004

    The Perception And Attitude Of Business To The Environment And Environmental Tax Reform

    Despite the fact that environmental taxes and Environmental Tax Reform (ETR) are accepted to be policies with desirable environmental and other economic effects, their implementation has been patchy. This paper explores the perceptions and attitudes of business in Ireland to ETR. The results suggest that, for the firms examined, while...

    Provided By University College Dublin

  • White Papers // Mar 2010

    Building Decision Trees From Decision Stumps

    Decision stumps are simple one layer decision trees using all the same settings as the typical decision trees. However, most decision stumps are not useful in prediction on their own. To produce more predictive models, a decision tree is better. Building a decision tree in SAS is much more difficult...

    Provided By University College Dublin

  • White Papers // Mar 2010

    Data Masking With Classical Ciphers

    Data masking and protection is an essential part of data processing. With easy access to data, encryption of sensitive information is now a critical part of the data process especially with respect to the new data regulations in place for many countries. While there are no explicit data encryption functions...

    Provided By University College Dublin

  • White Papers // Oct 2009

    Developing Self-Managing Embedded Systems With ASSL

    The authors present a new formal approach to the implementation of embedded systems, arrived at by introducing self-management capabilities to the same. They use the ASSL (Autonomic System Specification Language) framework to approach the problem of formal specification and automatic code generation of embedded systems. Some features of ASSL help...

    Provided By University College Dublin

  • White Papers // Feb 2011

    On the Scalability of Carrier-Grade Mesh Network Architectures

    The increasing popularity of multi-hop wireless mesh networks, augmented with specific mechanisms required to support carrier-grade services, makes them an attractive alternative to classical backhaul solutions for network operators. However, current mesh deployments are typically small-sized, and, under real-time service requirements, it is yet unclear if they could scale to...

    Provided By University College Dublin

  • White Papers // Jan 2010

    DACoRM: A Coordinated, Decentralized and Adaptive Network Resource Management Scheme

    In order to meet the requirements of emerging demanding services, network resource management functionality that is decentralized, flexible and adaptive to traffic and network dynamics is of paramount importance. In this paper, the authors describe the main mechanisms of DACoRM, a new intra-domain adaptive resource management approach for IP networks....

    Provided By University College Dublin

  • White Papers // Aug 2011

    Towards Decentralized and Adaptive Network Resource Management

    Current practices for managing resources in fixed networks rely on off-line approaches, which can be sub-optimal in the face of changing or unpredicted traffic demand. To cope with the limitations of these off-line configurations new Traffic Engineering (TE) schemes that can adapt to network and traffic dynamics are required. In...

    Provided By University College Dublin

  • White Papers // Feb 2011

    Refactoring as Testability Transformation

    This paper briefly reviews the theory of testability transformation and outlines its implications for and relationship to refactoring for testing. The paper introduces testability refactorings, a subclass of testability transformations and discusses possible examples of testability refactorings. Several approaches to testability refactoring are also introduced. These include the novel concept...

    Provided By University College Dublin

  • White Papers // Mar 2011

    Making the Case for MORTO: Multi Objective Regression Test Optimization

    This paper argues that regression test optimization problems such as selection and prioritization require multi objective optimization in order to adequately cater for real world regression testing scenarios. The paper presents several examples of costs and values that could be incorporated into such a Multi Objective Regression Test Optimization (MORTO)...

    Provided By University College Dublin

  • White Papers // Jun 2010

    Why Source Code Analysis and Manipulation Will Always Be Important

    This paper makes a case for source code analysis and manipulation. The paper argues that it will not only remain important, but that its importance will continue to grow. This argument is partly based on the 'Law' of tendency to executability, which the paper introduces. The paper also makes a...

    Provided By University College Dublin

  • White Papers // Mar 2012

    The Role of Artificial Intelligence in Software Engineering

    There has been a recent surge in interest in the application of Artificial Intelligence (AI) techniques to Software Engineering (SE) problems. The work is typified by recent advances in Search Based Software Engineering, but also by long established work in Probabilistic reasoning and machine learning for Software Engineering. This paper...

    Provided By University College Dublin

  • White Papers // May 2012

    Statistical Eigenmode SDMA Transmission for a Two-User Downlink

    This paper proposes a Statistical-Eigenmode Space Division Multiple-Access (SE-SDMA) transmission for a two-user downlink system where two transmit antennas are equipped at the base station and each mobile user has one receive antenna, assuming that only statistical Channel State Information (CSI) is available at the transmitter. By maximizing a lower...

    Provided By University College Dublin

  • White Papers // May 2012

    Valley-Free Violation in Internet Routing - Analysis Based on BGP Community Data

    The valley-free rule defines patterns of routing paths that allow the Internet Autonomous Systems (AS) to minimize their routing costs through selective announcement of BGP routes. The valley-free rule has been widely perceived as a universal property of the Internet BGP routing that is only violated due to transient configuration...

    Provided By University College Dublin

  • White Papers // May 2012

    A Verification Methodology for the Detection of Spectrally Efficient FDM Signals Generated Using Reconfigurable Hardware

    Simulation, using a model of a system or process, is widely accepted as a method of qualification and evaluation of complex systems. The success of a simulation depends on the accuracy of user defined values used to model parameters, which are gathered by analytical or empirical methods. In situations where...

    Provided By University College Dublin

  • White Papers // Mar 2012

    Optimal Pilot Based Frequency-Dependent I/Q Imbalance Compensation for Wideband Direct-Conversion Transmitters

    Current trends in low-cost and low power consumption transmitters in state-of-the-art wireless systems is to use the direct-conversion principle. Such transmitters, however, suffer severely from the I/Q imbalance effect, which introduces mirror-frequency interference and degrades data detection. This paper proposes a novel method for frequency-dependent I/Q imbalance estimation and compensation....

    Provided By University College Dublin

  • White Papers // May 2012

    Make Mine a Quadruple: Strengthening the Security of Graphical One-Time PIN Authentication

    Secure and reliable authentication is an essential prerequisite for many online systems, yet achieving this in a way which is acceptable to customers remains a challenge. GrIDsure, a one-time PIN scheme using random grids and personal patterns, has been proposed as a way to overcome some of these challenges. The...

    Provided By University College Dublin

  • White Papers // Mar 2009

    Remote Asynchronous Collaborative Web Search

    Web search is often an inherently collaborative task and therefore Collaborative Web Search (CWS) has taken on a new meaning. Despite the absence of explicit collaboration features from mainstream search engines, there is clear evidence that users implicitly engage in many different forms of collaboration as they search. Co-located systems...

    Provided By University College Dublin

  • White Papers // Dec 2009

    Containing Systemic Risk

    Systemic risk refers to the risk of financial system breakdown due to linkages between institutions. This risk cannot be assessed by looking at how individual institutions manage risks but instead requires a full understanding of how the system as a whole operates. At present, the data available to central banks...

    Provided By University College Dublin

  • White Papers // Jun 2010

    Female Labour Supply And Divorce: New Evidence From Ireland

    If participation in the labor market helps to secure women's outside options in the case of divorce/separation, an increase in the perceived risk of marital dissolution may accelerate the increase in female labor supply. This simple prediction has been tested in the literature using time and/or spatial variation in divorce...

    Provided By University College Dublin

  • White Papers // Sep 2010

    Risk Attitudes As An Independent Predictor Of Debt

    This paper examines how attitudes to risk relate to other psychological constructs of personality and consideration of future consequences (a proxy for time preferences) and how risk attitudes relate to credit behaviour and debt holdings. There is a small correlation between risk attitudes and consideration of future consequences. As regards...

    Provided By University College Dublin

  • White Papers // Mar 2010

    Network Coding With Modular Lattices

    Network coding is a tool for information transmission in networks. A network is considered to be a directed graph, where an edge from a vertex u to a vertex v is drawn, if u is able to send information directly to v. A subset of the vertices is the set...

    Provided By University College Dublin

  • White Papers // Aug 2010

    Scientific Advisory Boards As Social Resources Exploring Their Role, Use, And Impact In The Market Development Activities Of New Ventures

    This paper in progress paper formulates a research agenda for exploring new ventures' scientific advisory boards as a valuable source of social capital. While the human capital of such boards and the value of their relationships within the broader scientific community have been investigated in a small number of recent...

    Provided By University College Dublin

  • White Papers // Aug 2010

    Development Of New Ventures Through Time-A Theoretical Account

    This paper sets out to conceptually explore the origin, growth and development of a new venture. This new venture development process is explored using ideas from the IMP, Penrose and Loasby and insights from entrepreneurial literature. This paper to frame the discussion loosely uses an ARA frame to discuss this...

    Provided By University College Dublin

  • White Papers // Mar 2009

    Scaling Conditional Tail Probability And Quantile Estimators

    A key issue for risk management in practice is to decide the relevant horizon associated with risk measurement. Many different horizons may be relevant from short (e.g. daily) to long (e.g. monthly) timeframes and the risk manager must be able to provide measures across a range of horizons. This paper...

    Provided By University College Dublin

  • White Papers // Nov 2008

    Business Networks And Inward FDI Policy

    The author outlines the effect of business networks on trade, FDI and welfare in a two-country, two-firm duopoly. The network effect, following Greaney (2002), is modeled as a marginal cost disadvantage facing a firm from Foreign in selling to Home. Unlike traditional trade costs, this cost cannot be avoided by...

    Provided By University College Dublin

  • White Papers // Nov 2009

    Health Savings Accounts For Small Businesses And Entrepreneurs: Shopping, Take-up And Implementation Challenges

    A combination of High Deductible Health Plans (HDHPs) and Health Savings Accounts (HSAs) holds promise for expanding health insurance for small firms. The authors provide information on HSA take-up and shopping behavior from a 2008 survey of female small business owners, revealing that the HSA marketplace can be confusing for...

    Provided By University College Dublin

  • White Papers // Jun 2010

    Securing Wireless Sensor Networks: Introducing ASLAN - A Secure Lightweight Architecture for WSNs

    Wireless sensor networks consist of many small, inexpensive devices that have constraints in coverage, bandwidth, storage resources, communications ability and processing power. Therefore security issues are a critical concern due to possible exposure to malicious activity and potential threats. As a result of the physical constraints in sensor nodes, traditional...

    Provided By University College Dublin

  • White Papers // Sep 2009

    Comment On: Electoral Contests, Incumbency Advantages, And Campaign Finance

    This paper completes Meirowitz (2008) by analyzing the effect of a cap on political campaign spending in an environment where voters have initial preferences over political candidates. The policy implications are starkly different from the previously analyzed case where voters are indifferent between candidates in the absence of campaign spending....

    Provided By University College Dublin

  • White Papers // Aug 2009

    Dynamic Switching Between Adaptive FEC Protocols for Reliable Multi-Source Streaming

    Multi-source streaming is essential for the design of a large-scale P2P streaming architecture. In this paper, the authors focus on improving the dependability of multi-source video streaming as an alternative to the more prevalent point-to-point streaming. They have designed and implemented a Dynamic FEC (D-FEC) protocol for multi-source video streaming....

    Provided By University College Dublin

  • White Papers // Apr 2009

    System-Level Performance Evaluation of Multi-Cell Transparent Mode Relay 802.16j Systems

    In this paper, the system capacity of a multi-cell IEEE 802.16j system operating in transparent mode is investigated. A previous published analytical model is used and incorporates interference from neighboring cells. The model can be used to determine downlink performance under max-min fairness constraints for both sectored and omni-directional systems...

    Provided By University College Dublin

  • White Papers // Mar 2009

    An Adaptive Optimized RTO Algorithm for Multi-Homed Wireless Environments

    As a transport layer protocol SCTP uses end to end metrics, such as Retransmission Time Out (RTO), to manage mobility handover. The authors' investigation illustrates that Wireless LAN (WLAN) mobility causes continuously increased Round Trip Times (RTT) resulting from 802.11 MAC retransmissions, regardless of the service specified by upper layers....

    Provided By University College Dublin

  • White Papers // Nov 2008

    Development of an IEEE 802.11s Simulation Model for QualNet

    In this paper, an initial variant of a 802.11s simulation model for the QualNet simulator is described. The tool builds on the existing QualNet 802.11 model by adding capabilities suitable for mesh networking. More specifically, the model provides support for propagation of beacon frames in mesh networks and link establishment...

    Provided By University College Dublin

  • White Papers // Sep 2009

    Enhancement of Self-Organisation in Wireless Networking Through a Cross-Layer Approach

    Self-organisation has emerged as a very promising approach to the design, deployment, operation, control and evolution of complex wireless networks. The dominant strictly layered design style may however not be able to accommodate many useful optimisations, and the authors conjecture that cross-layer design may offer a more promising approach. In...

    Provided By University College Dublin

  • White Papers // Nov 2009

    Self-Management of Routing on Human Proximity Networks

    Many modern network applications, including sensor networks and MANETs, have dynamic topologies that reflect processes occurring in the outside world. These dynamic processes are a challenge to traditional information dissemination techniques, as the appropriate strategy changes according to the changes in topology. The authors show how network dynamics can be...

    Provided By University College Dublin