University College London

Displaying 1-40 of 54 results

  • White Papers // Mar 2012

    Probabilistic In-Network Caching for Information-Centric Networks

    In-network caching necessitates the transformation of centralised operations of traditional, overlay caching techniques to a decentralised and uncoordinated environment. Given that caching capacity in routers is relatively small in comparison to the amount of forwarded content, a key aspect is the distribution of content among the available caches. In this...

    Provided By University College London

  • White Papers // Mar 2012

    An Improved Differential Attack on Full GOST

    GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. A 256-bit block cipher considered as an alternative for AES-256 and triple DES, having an amazingly low implementation cost and is becoming increasingly popular. Until 2010 researchers unanimously agreed that: "Despite considerable cryptanalytic efforts...

    Provided By University College London

  • White Papers // Feb 2012

    Cache "Less for More" in Information-Centric Networks

    Ubiquitous in-network caching is one of the key aspects of Information-Centric Networking (ICN) which has recently received widespread research interest. In one of the key relevant proposals known as Networking Named Content (NNC), the premise is that leveraging in-network caching to store content in every node it traverses along the...

    Provided By University College London

  • White Papers // Jan 2012

    Squeeziness: An Information Theoretic Measure for Avoiding Fault Masking

    Fault masking can reduce the effectiveness of a test suite. The authors propose an information theoretic measure, Squeeziness, as the theoretical basis for avoiding fault masking. They begin by explaining fault masking and the relationship between collisions and fault masking. They then define Squeeziness and demonstrate by experiment that there...

    Provided By University College London

  • White Papers // Nov 2011

    Algebraic Complexity Reduction and Cryptanalysis of GOST

    GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. Its large key size of 256 bits at a particularly low implementation cost make GOST a plausible alternative for AES-256 and 3-key triple DES. The latter for the same block size of 64 bits...

    Provided By University College London

  • White Papers // Sep 2011

    On the End-to-End Delay Performance of Spatially Correlated Wireless Line Networks

    The analytical end-to-end (e2e) performance of a wireless multihop network is largely unknown, because of the interconnections between several factors involved. Customarily, the nodes are often assumed to be spatially uncorrelated so that they can be analyzed in isolation, which is valid when all the traffic flows are independent. In...

    Provided By University College London

  • White Papers // Jul 2011

    Monitoring, Aggregation and Filtering for Efficient Management of Virtual Networks

    Virtual Networks are characterised as highly dynamic network environments, where topologies and nodes adapt rapidly to changes in user and service demands, user location and context changes, or resource constraints. This paper presents a rigorous assessment of an Information Management Overlay (IMO) suitable for monitoring virtual networks. The IMO system...

    Provided By University College London

  • White Papers // Jul 2011

    Differential Cryptanalysis of GOST

    GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. A 256-bit block cipher considered as an alternative for AES-256 and triple DES, having an amazingly low implementation cost and thus increasingly popular. Until 2010 researchers unanimously agreed that: "Despite considerable cryptanalytic efforts spent...

    Provided By University College London

  • White Papers // Jun 2011

    Tradable Immigration Quotas

    International migration is maybe the single most effective way to alleviate poverty at a global level. When a given host country allows more immigrants in, this creates costs and benefits for that particular country as well as a positive externality for all those (individuals and governments) who care about world...

    Provided By University College London

  • White Papers // May 2011

    Towards In-Network Clouds in Future Internet

    One of the key aspects fundamentally missing from the current Internet infrastructure is an advanced service networking platform and facilities, which take advantage of flexible sharing of available connectivity, computation, and storage resources. This paper aims to explore the architectural co-existence of new and legacy services and networks, via virtualisation...

    Provided By University College London

  • White Papers // Mar 2011

    FLINT: Fault Localisation Using Information Theory

    Test case prioritisation techniques aim to maximise the chance of fault detection as early in testing as possible. This is most commonly achieved by prioritising the tests according to a surrogate measure that is thought to correspond to fault detection capabilities, such as code coverage. However, once the prioritised test...

    Provided By University College London

  • White Papers // Mar 2011

    Design, Implementation and Evaluation of Congestion Control for Multipath TCP

    Multipath TCP, as proposed by the IETF working group mptcp, allows a single data stream to be split across multiple paths. This has obvious benefits for reliability, and it can also lead to more efficient use of networked resources. The authors describe the design of a multipath congestion control algorithm,...

    Provided By University College London

  • White Papers // Feb 2011

    Modelling and Evaluation of CCN-Caching Trees

    Networking Named Content (NNC) was recently proposed as a new networking paradigm to realise Content Centric Networks (CCNs). The new paradigm changes much about the current Internet, from security and content naming and resolution, to caching at routers, and new flow models. In this paper, the authors study the caching...

    Provided By University College London

  • White Papers // Feb 2011

    Correlation Neglect In Financial Decision-Making

    Good decision-making often requires people to perceive and handle a myriad of statistical correlations. Notably, optimal portfolio theory depends upon a sophisticated understanding of the correlation among financial assets. In this paper, the authors examine people's understanding of correlation using a sequence of portfolio-allocation problems and find it to be...

    Provided By University College London

  • White Papers // Feb 2011

    Globalization, Brain Drain And Development

    This paper reviews four decades of economics research on the brain drain, with a focus on recent contributions and on development issues. The authors first assess the magnitude, intensity and determinants of the brain drain, showing that brain drain (or high-skill) migration is becoming the dominant pattern of international migration...

    Provided By University College London

  • White Papers // Jan 2011

    RESERVOIR - When One Cloud Is Not Enough

    As cloud computing becomes more predominant, the problem of scalability has become critical for cloud computing providers. The cloud paradigm is attractive because it offers a dramatic reduction in capital and operation expenses for consumers. But as the demand for cloud services increases, the ensuing increases in cost and complexity...

    Provided By University College London

  • White Papers // Jan 2011

    Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

    Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force group for some project needs to be built. This order is passed down the hierarchy where it finally reaches a manager who...

    Provided By University College London

  • White Papers // Jan 2011

    Non-Degrading Erasure-Tolerant Information Authentication With an Application to Multicast Stream Authentication Over Lossy Channels

    The concept of erasure-tolerant information authentication was recently introduced to study an unconditionally secure setting where it is allowed to lose a limited number of message letters during transmission. Even if a part of the message is lost, the verifier will still be able to check the authenticity of some...

    Provided By University College London

  • White Papers // Jan 2011

    Coalition-Based Peering for Flexible Connectivity

    Mobile devices available today provide users the ability to communicate using a number of different wireless network interfaces. However, these devices do not yet fully exploit the potential for multi-homed and multi-path communication allowing them to better utilise all the connectivity that is available to them. The authors present here...

    Provided By University College London

  • White Papers // Dec 2010

    Balancing by PREFLEX: Congestion Aware Traffic Engineering

    There has long been a need for a robust and reliable system which distributes traffic across multiple paths. In particular such a system must rarely reorder packets, must not require per-flow state, must cope with different paths having different bandwidths and must be self-tuning in a variety of network contexts....

    Provided By University College London

  • White Papers // Nov 2010

    Currency Forecasting Using Multiple Kernel Learning With Financially Motivated Features

    Multiple Kernel Learning (MKL) is used to replicate the signal combination process that trading rules embody when they aggregate multiple sources of financial information when predicting an asset's price movements. A set of financially motivated kernels is constructed for the EURUSD currency pair and is used to predict the direction...

    Provided By University College London

  • White Papers // Sep 2010

    Bubbles And Crashes With Partially Sophisticated Investors

    The authors analyze bubbles and crashes in a model in which some investors are partially sophisticated. While the expectations of such investors are endogenously determined in equilibrium, these are based on a coarse understanding of the market dynamics. They highlight how such investors may endogenously switch from euphoria to panic...

    Provided By University College London

  • White Papers // Sep 2010

    Towards Secure Cloud Bursting, Brokerage and Aggregation

    The cloud based delivery model for IT resources is revolutionizing the IT industry. Despite the marketing hype around "The cloud", the paradigm itself is in a critical transition state from the laboratories to mass market. Many technical and business aspects of cloud computing need to mature before it is widely...

    Provided By University College London

  • White Papers // Sep 2010

    An Efficient Secure Shared Storage Service With Fault and Investigative Disruption Tolerance

    In this paper, the authors focus on solutions to an emerging threat to cloud-based services - namely that of data seizures within a shared multiple customer architecture. They focus on the problem of securing distributed data storage in a cloud computing environment by designing a specialized multi-tenant data-storage architecture. The...

    Provided By University College London

  • White Papers // Sep 2010

    Software Architecture Definition for On-Demand Cloud Provisioning

    Cloud computing is a promising paradigm for the provisioning of IT services. Cloud computing infrastructures, such as those offered by the RESERVOIR project, aim to facilitate the deployment, management and execution of services across multiple physical locations in a seamless manner. In order for service providers to meet their quality...

    Provided By University College London

  • White Papers // Jun 2010

    The Cloud Supply Chain: A Framework for Information, Monitoring, Accounting and Billing

    Cloud computing is changing the way in which companies deploy and operate ICT based services. This paradigm introduces several advantages compared with traditional data centers, such as a great degree of flexibility, pay-per-use models, and rapid resource provisioning. However, the lack of a well defined supply chain for clouds and...

    Provided By University College London

  • White Papers // Jun 2010

    Structuring Protocol Implementations to Protect Sensitive Data

    In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution of application code with reduced privilege. In this paper, the authors identify and address the vital and largely unexamined problem of how to structure implementations...

    Provided By University College London

  • White Papers // Apr 2010

    Elastic Service Management in Computational Clouds

    Cloud computing, is rapidly changing the landscape of traditional IT service provisioning. It presents service providers with the potential to significantly reduce initial capital investment into hardware by removing costs associated with the deployment and management of hardware resources and enabling them to lease infrastructure resources on demand from a...

    Provided By University College London

  • White Papers // Apr 2010

    A Survey of Cognitive Radio Access to TV White Spaces

    Cognitive radio is being intensively researched as the enabling technology for license-exempt access to the so-called TV White Spaces (TVWS), large portions of spectrum in the UHF/VHF bands which become available on a geographical basis after digital switchover. Both in the US and more recently, in the UK the regulators...

    Provided By University College London

  • White Papers // Feb 2010

    Monitoring Virtual Networks With Lattice

    The use of the Lattice monitoring framework as a fundamental part of an overlay management system for virtual networks is presented. Lattice has been specially designed for monitoring resources and services in virtualized environments, including virtual networks. Monitoring of virtualized resources and services has many criteria which are not relevant...

    Provided By University College London

  • White Papers // Feb 2010

    High-Powered Incentives In Developing Country Health Insurance: Evidence From Colombia's "Regimen Subsidiado

    Despite current emphasis on health insurance expansions in developing countries, inefficient consumer incentives for over-use of medical care are an important counterbalancing concern. However, three factors that are more acute in poor countries (credit constraints, principal-agent problems, and positive externalities) result in substantial under-use and misuse as well. This paper...

    Provided By University College London

  • White Papers // Dec 2009

    Cryptanalysis of Secure Message Transmission Protocols With Feedback

    In the context of secure point-to-point message transmission in networks with minimal connectivity, previous studies showed that feedbacks from the receiver to the sender can be used to reduce the requirements of network connectivity. The authors observe that the way how feedbacks were used in previous work does not guarantee...

    Provided By University College London

  • White Papers // Dec 2009

    Distributed Cross-Domain Change Management

    Distributed systems increasingly span organizational boundaries and, with this, system and service management domains. Web services are the primary means of exposing services to clients, be it in electronic commerce, Software as-a-Service (SaaS) or on cloud platforms and are being used and integrated with customer-managed applications as well as in...

    Provided By University College London

  • White Papers // Oct 2009

    Two Algorithms for Network Size Estimation for Master/Slave Ad Hoc Networks

    This paper proposes an adaptation of two network size estimation methods: random tour and gossip-based aggregation to suit master/slave mobile ad hoc networks. The authors show that it is feasible to accurately estimate the size of ad hoc networks when topology changes due to mobility using both methods. The algorithms...

    Provided By University College London

  • White Papers // Oct 2009

    A Critical Look at Power Law Modeling of the Internet

    This paper takes a critical look at the usefulness of power law models of the Internet. The twin focuses of the paper are Internet traffic and topology generation. The aim of the paper is twofold. Firstly it summarises the state of the art in power law modeling particularly giving attention...

    Provided By University College London

  • White Papers // Oct 2009

    Criticisms of Modelling Packet Traffic Using Long-Range Dependence

    This paper criticises the notion that long-range dependence is an important contributor to the queuing behaviour of real Internet traffic. The idea is questioned in two different ways. Firstly, a class of models used to simulate Internet traffic is shown to have important theoretical flaws. It is shown that this...

    Provided By University College London

  • White Papers // Sep 2009

    Composition Bias And Italian Wage Rigidities Over The Business Cycle

    The author estimates the cyclicality of Italian real wages over the period 1985-2003 controlling for the so-called "Composition bias". Aggregate real wage statistics, commonly used to measure real wage elasticity, are affected by the bias arising from the cyclical change in the skill-composition of the labor force. An analysis on...

    Provided By University College London

  • White Papers // Aug 2009

    A Spatial Decision Support System for Property Valuation

    Off late it is increasingly recognised that land management is a multi faceted challenge, in which social, economic and physical dimensions must be considered. In addition, the call for sustainable development (WCED, 1987) increases the importance of effective land management at all levels. Hence, there is need for new approaches...

    Provided By University College London

  • White Papers // Jun 2009

    Quantifying the Availability of TV White Spaces for Cognitive Radio Operation in the UK

    Cognitive Radio (CR) technology is a key enabler for the Opportunistic Spectrum Access (OSA) model, a potentially revolutionary new paradigm for dynamic sharing of licenced spectrum with unlicensed devices. In this operational mode a cognitive radio acts as a spectrum scavenger. It performs spectrum sensing over a range of frequency...

    Provided By University College London

  • White Papers // May 2009

    The Compliance Testing of Software Tools With Respect to the UML Standards Specification - The ArgoUML Case Study

    In ICSE'08 the authors demonstrated the Java UML Lightweight Enumerator (JULE) tool, which supports compliance test generation from modeling standards specifications. When employed in the authors' framework for software tool certification, JULE provides a powerful technology to enumerate a set of test cases that exhaustively test a modeling tool. JULE...

    Provided By University College London

  • White Papers // Jan 2009

    The Human Immune System and Network Intrusion Detection

    This paper reviews and assesses the analogy between the human immune system and network intrusion detection systems. The promising results from a growing number of proposed computer immune models for intrusion detection motivate this work. The paper begins by briefly introducing existing Intrusion Detection Systems (IDS's). A set of general...

    Provided By University College London

  • White Papers // May 2009

    Implementing Network Virtualization for a Future Internet

    The Internet has become an essential communication medium upon which billions of people rely every day. However, necessary evolution of the Internet has been severely limited by reliability constrains and social-economic factors. Experts fear that current growth rates will threaten the future of the Internet as a whole, despite the...

    Provided By University College London

  • White Papers // Aug 2009

    A Spatial Decision Support System for Property Valuation

    Off late it is increasingly recognised that land management is a multi faceted challenge, in which social, economic and physical dimensions must be considered. In addition, the call for sustainable development (WCED, 1987) increases the importance of effective land management at all levels. Hence, there is need for new approaches...

    Provided By University College London

  • White Papers // Aug 2008

    Collection Sales: Good Or Bad For Journals?

    This paper discusses the impact of collection sales (i.e., the bundling of several journals for sale by publishers to libraries) on journals. The advent of electronic journal distribution implies that bundling is an efficient sales strategy, and can act to extend the reach of a journal. Current arrangements are discussed...

    Provided By University College London

  • White Papers // Apr 2009

    Trace: Android Software and Client Server Architecture

    This paper will concern the development of Trace, a mobile platform designed for inputting tracking data and obtaining market prices on a given product. The client software is based on Android, an open-source mobile platform. The idea for the application originated from the Fair Tracing project, which aims to Support...

    Provided By University College London

  • White Papers // Dec 2009

    Distributed Cross-Domain Change Management

    Distributed systems increasingly span organizational boundaries and, with this, system and service management domains. Web services are the primary means of exposing services to clients, be it in electronic commerce, Software as-a-Service (SaaS) or on cloud platforms and are being used and integrated with customer-managed applications as well as in...

    Provided By University College London

  • White Papers // Jun 2010

    The Cloud Supply Chain: A Framework for Information, Monitoring, Accounting and Billing

    Cloud computing is changing the way in which companies deploy and operate ICT based services. This paradigm introduces several advantages compared with traditional data centers, such as a great degree of flexibility, pay-per-use models, and rapid resource provisioning. However, the lack of a well defined supply chain for clouds and...

    Provided By University College London

  • White Papers // Feb 2011

    Correlation Neglect In Financial Decision-Making

    Good decision-making often requires people to perceive and handle a myriad of statistical correlations. Notably, optimal portfolio theory depends upon a sophisticated understanding of the correlation among financial assets. In this paper, the authors examine people's understanding of correlation using a sequence of portfolio-allocation problems and find it to be...

    Provided By University College London

  • White Papers // May 2009

    The Dark Side of Security by Obscurity: And Cloning Mifare Classic Rail and Building Passes, Anywhere, Anytime

    MiFare Classic is the most popular contactless smart card with about 200 million copies in circulation worldwide. At Esorics 2008 Dutch researchers showed that the underlying cipher Crypto-1 can be cracked in as little as 0.1 seconds if the attacker can access or eavesdrop the RF communications with the (Genuine)...

    Provided By University College London

  • White Papers // Jun 2010

    Structuring Protocol Implementations to Protect Sensitive Data

    In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution of application code with reduced privilege. In this paper, the authors identify and address the vital and largely unexamined problem of how to structure implementations...

    Provided By University College London

  • White Papers // Sep 2009

    Composition Bias And Italian Wage Rigidities Over The Business Cycle

    The author estimates the cyclicality of Italian real wages over the period 1985-2003 controlling for the so-called "Composition bias". Aggregate real wage statistics, commonly used to measure real wage elasticity, are affected by the bias arising from the cyclical change in the skill-composition of the labor force. An analysis on...

    Provided By University College London

  • White Papers // Apr 2009

    Evaluating and Optimising Models of Network Growth

    This paper presents a statistically sound method for measuring the accuracy with which a probabilistic model reflects the growth of a network, and a method for optimising parameters in such a model. The technique is data-driven, and can be used for the modeling and simulation of any kind of evolving...

    Provided By University College London

  • White Papers // Dec 2009

    Cryptanalysis of Secure Message Transmission Protocols With Feedback

    In the context of secure point-to-point message transmission in networks with minimal connectivity, previous studies showed that feedbacks from the receiver to the sender can be used to reduce the requirements of network connectivity. The authors observe that the way how feedbacks were used in previous work does not guarantee...

    Provided By University College London

  • White Papers // Jun 2009

    Quantifying the Availability of TV White Spaces for Cognitive Radio Operation in the UK

    Cognitive Radio (CR) technology is a key enabler for the Opportunistic Spectrum Access (OSA) model, a potentially revolutionary new paradigm for dynamic sharing of licenced spectrum with unlicensed devices. In this operational mode a cognitive radio acts as a spectrum scavenger. It performs spectrum sensing over a range of frequency...

    Provided By University College London

  • White Papers // Jan 2011

    Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

    Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force group for some project needs to be built. This order is passed down the hierarchy where it finally reaches a manager who...

    Provided By University College London

  • White Papers // Oct 2009

    Two Algorithms for Network Size Estimation for Master/Slave Ad Hoc Networks

    This paper proposes an adaptation of two network size estimation methods: random tour and gossip-based aggregation to suit master/slave mobile ad hoc networks. The authors show that it is feasible to accurately estimate the size of ad hoc networks when topology changes due to mobility using both methods. The algorithms...

    Provided By University College London

  • White Papers // Oct 2009

    Criticisms of Modelling Packet Traffic Using Long-Range Dependence

    This paper criticises the notion that long-range dependence is an important contributor to the queuing behaviour of real Internet traffic. The idea is questioned in two different ways. Firstly, a class of models used to simulate Internet traffic is shown to have important theoretical flaws. It is shown that this...

    Provided By University College London

  • White Papers // Oct 2009

    A Critical Look at Power Law Modeling of the Internet

    This paper takes a critical look at the usefulness of power law models of the Internet. The twin focuses of the paper are Internet traffic and topology generation. The aim of the paper is twofold. Firstly it summarises the state of the art in power law modeling particularly giving attention...

    Provided By University College London

  • White Papers // Nov 2010

    Currency Forecasting Using Multiple Kernel Learning With Financially Motivated Features

    Multiple Kernel Learning (MKL) is used to replicate the signal combination process that trading rules embody when they aggregate multiple sources of financial information when predicting an asset's price movements. A set of financially motivated kernels is constructed for the EURUSD currency pair and is used to predict the direction...

    Provided By University College London

  • White Papers // Sep 2010

    Bubbles And Crashes With Partially Sophisticated Investors

    The authors analyze bubbles and crashes in a model in which some investors are partially sophisticated. While the expectations of such investors are endogenously determined in equilibrium, these are based on a coarse understanding of the market dynamics. They highlight how such investors may endogenously switch from euphoria to panic...

    Provided By University College London

  • White Papers // Jul 2011

    Differential Cryptanalysis of GOST

    GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. A 256-bit block cipher considered as an alternative for AES-256 and triple DES, having an amazingly low implementation cost and thus increasingly popular. Until 2010 researchers unanimously agreed that: "Despite considerable cryptanalytic efforts spent...

    Provided By University College London

  • White Papers // May 2009

    The Compliance Testing of Software Tools With Respect to the UML Standards Specification - The ArgoUML Case Study

    In ICSE'08 the authors demonstrated the Java UML Lightweight Enumerator (JULE) tool, which supports compliance test generation from modeling standards specifications. When employed in the authors' framework for software tool certification, JULE provides a powerful technology to enumerate a set of test cases that exhaustively test a modeling tool. JULE...

    Provided By University College London

  • White Papers // Mar 2011

    Design, Implementation and Evaluation of Congestion Control for Multipath TCP

    Multipath TCP, as proposed by the IETF working group mptcp, allows a single data stream to be split across multiple paths. This has obvious benefits for reliability, and it can also lead to more efficient use of networked resources. The authors describe the design of a multipath congestion control algorithm,...

    Provided By University College London

  • White Papers // Jan 2011

    Non-Degrading Erasure-Tolerant Information Authentication With an Application to Multicast Stream Authentication Over Lossy Channels

    The concept of erasure-tolerant information authentication was recently introduced to study an unconditionally secure setting where it is allowed to lose a limited number of message letters during transmission. Even if a part of the message is lost, the verifier will still be able to check the authenticity of some...

    Provided By University College London

  • White Papers // Feb 2011

    Globalization, Brain Drain And Development

    This paper reviews four decades of economics research on the brain drain, with a focus on recent contributions and on development issues. The authors first assess the magnitude, intensity and determinants of the brain drain, showing that brain drain (or high-skill) migration is becoming the dominant pattern of international migration...

    Provided By University College London

  • White Papers // Jun 2011

    Tradable Immigration Quotas

    International migration is maybe the single most effective way to alleviate poverty at a global level. When a given host country allows more immigrants in, this creates costs and benefits for that particular country as well as a positive externality for all those (individuals and governments) who care about world...

    Provided By University College London

  • White Papers // Feb 2010

    High-Powered Incentives In Developing Country Health Insurance: Evidence From Colombia's "Regimen Subsidiado

    Despite current emphasis on health insurance expansions in developing countries, inefficient consumer incentives for over-use of medical care are an important counterbalancing concern. However, three factors that are more acute in poor countries (credit constraints, principal-agent problems, and positive externalities) result in substantial under-use and misuse as well. This paper...

    Provided By University College London

  • White Papers // Apr 2009

    Flow Processing and the Rise of Commodity Network Hardware

    The Internet has seen a proliferation of specialized middle-box devices that carry out crucial network functionality such as load balancing, packet inspection and intrusion detection. Recent advances in CPU power, memory, buses and network connectivity have turned commodity PC hardware into a powerful network platform. Furthermore, commodity switch technologies have...

    Provided By University College London

  • White Papers // Jan 2009

    Persistent Content-Based Information Dissemination in Hybrid Vehicular Networks

    Content-based information dissemination has a potential number of applications in vehicular networking, including advertising, traffic and parking notifications and emergency announcements. In this paper the authors describe a protocol for content based information dissemination in hybrid (i.e., partially structureless) vehicular networks. The protocol allows content to "Stick" to areas where...

    Provided By University College London

  • White Papers // Sep 2010

    Towards Secure Cloud Bursting, Brokerage and Aggregation

    The cloud based delivery model for IT resources is revolutionizing the IT industry. Despite the marketing hype around "The cloud", the paradigm itself is in a critical transition state from the laboratories to mass market. Many technical and business aspects of cloud computing need to mature before it is widely...

    Provided By University College London

  • White Papers // May 2011

    Towards In-Network Clouds in Future Internet

    One of the key aspects fundamentally missing from the current Internet infrastructure is an advanced service networking platform and facilities, which take advantage of flexible sharing of available connectivity, computation, and storage resources. This paper aims to explore the architectural co-existence of new and legacy services and networks, via virtualisation...

    Provided By University College London

  • White Papers // Sep 2010

    Software Architecture Definition for On-Demand Cloud Provisioning

    Cloud computing is a promising paradigm for the provisioning of IT services. Cloud computing infrastructures, such as those offered by the RESERVOIR project, aim to facilitate the deployment, management and execution of services across multiple physical locations in a seamless manner. In order for service providers to meet their quality...

    Provided By University College London

  • White Papers // Apr 2010

    Elastic Service Management in Computational Clouds

    Cloud computing, is rapidly changing the landscape of traditional IT service provisioning. It presents service providers with the potential to significantly reduce initial capital investment into hardware by removing costs associated with the deployment and management of hardware resources and enabling them to lease infrastructure resources on demand from a...

    Provided By University College London

  • White Papers // Jan 2011

    RESERVOIR - When One Cloud Is Not Enough

    As cloud computing becomes more predominant, the problem of scalability has become critical for cloud computing providers. The cloud paradigm is attractive because it offers a dramatic reduction in capital and operation expenses for consumers. But as the demand for cloud services increases, the ensuing increases in cost and complexity...

    Provided By University College London

  • White Papers // Feb 2010

    Monitoring Virtual Networks With Lattice

    The use of the Lattice monitoring framework as a fundamental part of an overlay management system for virtual networks is presented. Lattice has been specially designed for monitoring resources and services in virtualized environments, including virtual networks. Monitoring of virtualized resources and services has many criteria which are not relevant...

    Provided By University College London

  • White Papers // Sep 2010

    An Efficient Secure Shared Storage Service With Fault and Investigative Disruption Tolerance

    In this paper, the authors focus on solutions to an emerging threat to cloud-based services - namely that of data seizures within a shared multiple customer architecture. They focus on the problem of securing distributed data storage in a cloud computing environment by designing a specialized multi-tenant data-storage architecture. The...

    Provided By University College London

  • White Papers // Jan 2011

    Coalition-Based Peering for Flexible Connectivity

    Mobile devices available today provide users the ability to communicate using a number of different wireless network interfaces. However, these devices do not yet fully exploit the potential for multi-homed and multi-path communication allowing them to better utilise all the connectivity that is available to them. The authors present here...

    Provided By University College London

  • White Papers // Apr 2010

    A Survey of Cognitive Radio Access to TV White Spaces

    Cognitive radio is being intensively researched as the enabling technology for license-exempt access to the so-called TV White Spaces (TVWS), large portions of spectrum in the UHF/VHF bands which become available on a geographical basis after digital switchover. Both in the US and more recently, in the UK the regulators...

    Provided By University College London

  • White Papers // Mar 2011

    FLINT: Fault Localisation Using Information Theory

    Test case prioritisation techniques aim to maximise the chance of fault detection as early in testing as possible. This is most commonly achieved by prioritising the tests according to a surrogate measure that is thought to correspond to fault detection capabilities, such as code coverage. However, once the prioritised test...

    Provided By University College London

  • White Papers // Dec 2008

    An Implementation of a First-Person Game on a Hybrid Network

    The majority of current networked virtual environments and networked games use a client-server model of networking. This makes synchronization of the environment simple, but it adds additional latency between any two clients. Peer-to-peer networking is a common alternative, but whilst these systems have potentially lower latency, they are more difficult...

    Provided By University College London