University of Agder

Displaying 1-11 of 11 results

  • White Papers // Aug 2012

    A One-Time Server-Specific Password Authentication Scheme

    Over the years, Password-based Authentication (PA) techniques have been the widely used security mechanism that serves as a first level defence against unauthorized access. However, it is paramount that existing PA techniques should be improved upon in order to adequately protect computer systems and networks from password attacks. This paper...

    Provided By University of Agder

  • White Papers // Mar 2012

    Destructible Password Functionality Authentication Protocol

    As computers and networks become major drivers of human services, the issue of efficient authentication takes a central focus to ensure the continued uptake of ICT services by businesses and individuals. Authentication, which has become an integral part of almost all information systems, can be used to verify either the...

    Provided By University of Agder

  • White Papers // Jan 2012

    Optimization of the Relay Selection Scheme in Cooperative Retransmission Networks

    While the benefits of cooperative diversity have been well studied in the literature, cooperative MAC protocol design has attracted more and more attention recently. In single-relay Cooperative Automatic Repeat reQuest (C-ARQ) protocol, the best relay node is selected in a distributed manner by relays using different backoff time before packet...

    Provided By University of Agder

  • White Papers // Sep 2011

    A TDMA-Based MAC Protocol Supporting Cooperative Communications in Wireless Mesh Networks

    This paper proposes a TDMA-based medium access control protocol which enables cooperative communications in multi-hop wireless mesh networks. According to the proposed scheme, each router at the two-hop neighbourhood of each other is allocated to a specific time slot for accommodating either direct or cooperative transmissions in a coordinated manner,...

    Provided By University of Agder

  • White Papers // Jun 2011

    Teaching Model Driven Language Handling

    Many universities teach computer language handling by mainly focusing on compiler theory, although MDD (Model-Driven Development) and meta-modelling are increasingly important in the software industry as well as in computer science. In this paper, the authors share some experiences from teaching a course in computer language handling where the focus...

    Provided By University of Agder

  • White Papers // Apr 2011

    Visualizing and Assessing a Compositional Approach to Service-Oriented Business Process Design Using Unified Modelling Language (UML)

    In the context of Service-Oriented Architecture (SOA), complex systems can be realized through the visualization of business driven processes. The automation of Service Supported Systems (SSS) is the future integral part of core SOA which provides preprocessed information and solution suggestions for the Cloud Computing Users (CCU). CCU requires compact...

    Provided By University of Agder

  • White Papers // Aug 2010

    Innovation In Knowledge-Intensive Supply Chain Relationships

    The purpose of this paper is to help create a better understanding of the development of knowledge, innovation and the combining of resources in the interface between knowledge-intensive autonomous firms. The literature addressed is from the fields of combining resources, joint problem solving, innovation and knowledge, transaction cost economics and...

    Provided By University of Agder

  • White Papers // Aug 2010

    Supplier-Customer Relationships And Theoretical Perspectives: Network Theories And Principal-Agent Theory Applied To The Analysis Of Industrial Contracts And Interaction

    The purpose of this paper is to identify the nature of the relationships between a specialist supplier to the car industry (HARA) and its customers, most of which are car assembly manufacturers. The theoretical perspectives of network theory, transaction cost theory, principal-agent theory and power dependence theory are applied to...

    Provided By University of Agder

  • White Papers // Jun 2010

    ERP System Success Assessment In SMEs

    The purpose of this paper is to present a research in progress exploring the issue of Enterprise Resource Planning (ERP) systems success assessment in Small and Medium-sized Enterprises (SMEs). The intention is to provide a sound theoretical basis for a future empirical research. Hence, I go through the extant models...

    Provided By University of Agder

  • White Papers // Apr 2010

    Egocentric Database Operations for Social and Economic Network Analysis

    Recent research development on egocentric social network analysis focuses on the causes and consequences of relationships among sets of people rather than on the features attribute data of individuals, and their basic database operations. This work describes a record type of network data model that would be suitable to perform...

    Provided By University of Agder

  • White Papers // Oct 2009

    Improvement of Chord Overlay for P2PSIP-Based Communication Systems

    Chord has been suggested by IETF P2PSIP working group as mandatory overlay technology in the future P2PSIP-based communication systems. Chord allows for the available peer/resource lookup in no more than log N hops, where N is the total number of the peers in the overlay network. However, as a protocol...

    Provided By University of Agder

  • White Papers // Jun 2010

    ERP System Success Assessment In SMEs

    The purpose of this paper is to present a research in progress exploring the issue of Enterprise Resource Planning (ERP) systems success assessment in Small and Medium-sized Enterprises (SMEs). The intention is to provide a sound theoretical basis for a future empirical research. Hence, I go through the extant models...

    Provided By University of Agder

  • White Papers // Oct 2009

    Improvement of Chord Overlay for P2PSIP-Based Communication Systems

    Chord has been suggested by IETF P2PSIP working group as mandatory overlay technology in the future P2PSIP-based communication systems. Chord allows for the available peer/resource lookup in no more than log N hops, where N is the total number of the peers in the overlay network. However, as a protocol...

    Provided By University of Agder

  • White Papers // Aug 2010

    Innovation In Knowledge-Intensive Supply Chain Relationships

    The purpose of this paper is to help create a better understanding of the development of knowledge, innovation and the combining of resources in the interface between knowledge-intensive autonomous firms. The literature addressed is from the fields of combining resources, joint problem solving, innovation and knowledge, transaction cost economics and...

    Provided By University of Agder

  • White Papers // Aug 2010

    Supplier-Customer Relationships And Theoretical Perspectives: Network Theories And Principal-Agent Theory Applied To The Analysis Of Industrial Contracts And Interaction

    The purpose of this paper is to identify the nature of the relationships between a specialist supplier to the car industry (HARA) and its customers, most of which are car assembly manufacturers. The theoretical perspectives of network theory, transaction cost theory, principal-agent theory and power dependence theory are applied to...

    Provided By University of Agder

  • White Papers // Sep 2011

    A TDMA-Based MAC Protocol Supporting Cooperative Communications in Wireless Mesh Networks

    This paper proposes a TDMA-based medium access control protocol which enables cooperative communications in multi-hop wireless mesh networks. According to the proposed scheme, each router at the two-hop neighbourhood of each other is allocated to a specific time slot for accommodating either direct or cooperative transmissions in a coordinated manner,...

    Provided By University of Agder

  • White Papers // Jun 2011

    Teaching Model Driven Language Handling

    Many universities teach computer language handling by mainly focusing on compiler theory, although MDD (Model-Driven Development) and meta-modelling are increasingly important in the software industry as well as in computer science. In this paper, the authors share some experiences from teaching a course in computer language handling where the focus...

    Provided By University of Agder

  • White Papers // Jan 2012

    Optimization of the Relay Selection Scheme in Cooperative Retransmission Networks

    While the benefits of cooperative diversity have been well studied in the literature, cooperative MAC protocol design has attracted more and more attention recently. In single-relay Cooperative Automatic Repeat reQuest (C-ARQ) protocol, the best relay node is selected in a distributed manner by relays using different backoff time before packet...

    Provided By University of Agder

  • White Papers // Apr 2011

    Visualizing and Assessing a Compositional Approach to Service-Oriented Business Process Design Using Unified Modelling Language (UML)

    In the context of Service-Oriented Architecture (SOA), complex systems can be realized through the visualization of business driven processes. The automation of Service Supported Systems (SSS) is the future integral part of core SOA which provides preprocessed information and solution suggestions for the Cloud Computing Users (CCU). CCU requires compact...

    Provided By University of Agder

  • White Papers // Mar 2012

    Destructible Password Functionality Authentication Protocol

    As computers and networks become major drivers of human services, the issue of efficient authentication takes a central focus to ensure the continued uptake of ICT services by businesses and individuals. Authentication, which has become an integral part of almost all information systems, can be used to verify either the...

    Provided By University of Agder

  • White Papers // Aug 2012

    A One-Time Server-Specific Password Authentication Scheme

    Over the years, Password-based Authentication (PA) techniques have been the widely used security mechanism that serves as a first level defence against unauthorized access. However, it is paramount that existing PA techniques should be improved upon in order to adequately protect computer systems and networks from password attacks. This paper...

    Provided By University of Agder

  • White Papers // Apr 2010

    Egocentric Database Operations for Social and Economic Network Analysis

    Recent research development on egocentric social network analysis focuses on the causes and consequences of relationships among sets of people rather than on the features attribute data of individuals, and their basic database operations. This work describes a record type of network data model that would be suitable to perform...

    Provided By University of Agder