University of Anbar

Displaying 1-6 of 6 results

  • White Papers // Jul 2012

    Towards Meta-Adaptation Support With Reusable and Composable Adaptation Components

    Software systems today are increasingly used in changing environments and expected to adapt with variable adaptation concerns. This requirement demands a systematic approach to efficiently construct system global adaptation behaviour according to the dynamic adaptation requirements. This paper presents Transformer - a framework for adaptation behaviour composition support based on...

    Provided By University of Anbar

  • White Papers // Jun 2012

    Pull Versus Push Mechanism in Large Distributed Networks: Closed Form Results

    Distributed networks typically consist of a set of nodes interconnected through a network, each equipped with a single server to process jobs. Jobs may enter the network via one or multiple central dispatchers or via the processing nodes themselves. In the former case the dispatchers will distribute the jobs among...

    Provided By University of Anbar

  • White Papers // May 2012

    Multi-MAC: A Multiple MAC Network Stack Architecture for TinyOS

    Due to the extreme energy requirements often found in sensor networks and the fact that these sensor networks are being used for an increasingly wide variety of applications, there currently exist many different sensor network MAC protocols each optimised for a different set of application requirements. Since these MAC protocols...

    Provided By University of Anbar

  • White Papers // Jun 2011

    Trading Off Complexity for Expressiveness in Programming Languages for Embedded Devices: Visions and Experiences

    When programming resource-scarce embedded smart devices the designer requires both the low-level system programming features of a language such as C and higher level capability typical of a language like Java. The choice of a particular language often implies trade offs between conflicting design goals such as performance, costs, time-to-market,...

    Provided By University of Anbar

  • White Papers // Jun 2011

    Reducing the Authentication Cost in Quantum Cryptography

    Quantum cryptography utilizes quantum phenomena such as the no-cloning theorem and the Heisenberg uncertainty principle to achieve the goal of secure communication over quantum channels. The object of a Quantum Key Distribution (QKD) protocol is to enable Alice and Bob to securely distribute session keys that can be used for...

    Provided By University of Anbar

  • White Papers // Nov 2010

    Which Maturity Is Being Measured? A Classification of Business Process Maturity Models

    Today's organizations face the challenge to excel due to demanding customers. Hence, they are relying on their business processes to outperform competitors. Maturity models have been proposed to gradually assess and improve business processes. However, the proliferation of business process maturity models has complicated the practitioner's choice. This paper clarifies...

    Provided By University of Anbar

  • White Papers // Nov 2010

    Which Maturity Is Being Measured? A Classification of Business Process Maturity Models

    Today's organizations face the challenge to excel due to demanding customers. Hence, they are relying on their business processes to outperform competitors. Maturity models have been proposed to gradually assess and improve business processes. However, the proliferation of business process maturity models has complicated the practitioner's choice. This paper clarifies...

    Provided By University of Anbar

  • White Papers // Jun 2011

    Reducing the Authentication Cost in Quantum Cryptography

    Quantum cryptography utilizes quantum phenomena such as the no-cloning theorem and the Heisenberg uncertainty principle to achieve the goal of secure communication over quantum channels. The object of a Quantum Key Distribution (QKD) protocol is to enable Alice and Bob to securely distribute session keys that can be used for...

    Provided By University of Anbar

  • White Papers // Jun 2012

    Pull Versus Push Mechanism in Large Distributed Networks: Closed Form Results

    Distributed networks typically consist of a set of nodes interconnected through a network, each equipped with a single server to process jobs. Jobs may enter the network via one or multiple central dispatchers or via the processing nodes themselves. In the former case the dispatchers will distribute the jobs among...

    Provided By University of Anbar

  • White Papers // May 2012

    Multi-MAC: A Multiple MAC Network Stack Architecture for TinyOS

    Due to the extreme energy requirements often found in sensor networks and the fact that these sensor networks are being used for an increasingly wide variety of applications, there currently exist many different sensor network MAC protocols each optimised for a different set of application requirements. Since these MAC protocols...

    Provided By University of Anbar

  • White Papers // Jul 2012

    Towards Meta-Adaptation Support With Reusable and Composable Adaptation Components

    Software systems today are increasingly used in changing environments and expected to adapt with variable adaptation concerns. This requirement demands a systematic approach to efficiently construct system global adaptation behaviour according to the dynamic adaptation requirements. This paper presents Transformer - a framework for adaptation behaviour composition support based on...

    Provided By University of Anbar

  • White Papers // Jun 2011

    Trading Off Complexity for Expressiveness in Programming Languages for Embedded Devices: Visions and Experiences

    When programming resource-scarce embedded smart devices the designer requires both the low-level system programming features of a language such as C and higher level capability typical of a language like Java. The choice of a particular language often implies trade offs between conflicting design goals such as performance, costs, time-to-market,...

    Provided By University of Anbar