University of Antwerp

Displaying 1-40 of 52 results

  • White Papers // Oct 2013

    Privacy-Preserving Smart Metering: Methods and Applicability

    Privacy-sensitive information can be extracted from the load data which is available in high resolution in smart metering. A number of approaches to Privacy-Enhancing Technologies (PET) have been suggested to provide privacy in smart metering while maintaining (a certain level of) functionality. To date, most of these approaches have not...

    Provided By University of Antwerp

  • White Papers // Aug 2013

    Integrating Semantic Knowledge in Data Stream Processing

    Complex Event Processing (CEP) has been established as a well-suited software technology for processing high-frequent data streams. However, intelligent stream based systems must integrate stream data with semantical background knowledge. In this paper, the authors investigate different approaches on integrating stream data and semantic domain knowledge. In particular, they discuss...

    Provided By University of Antwerp

  • White Papers // Aug 2013

    Multi-Resolution Load Curve Representation with Privacy-Preserving Aggregation

    The availability of individual load curves per household in the smart grid end-user domain combined with nonintrusive load monitoring to infer personal data from these load curves has led to privacy concerns. Two types of approaches show high potential to resolve this issue: secure aggregation and multi-resolution representation with conditional...

    Provided By University of Antwerp

  • White Papers // Jul 2013

    ANANAS - A Framework For Analyzing Android Applications

    Android is an open software platform for mobile devices with a large market share in the Smartphone sector. The openness of the system as well as its wide adoption lead to an increasing amount of malware developed for this platform. ANANAS is an expandable and modular framework for analyzing Android...

    Provided By University of Antwerp

  • White Papers // Jul 2013

    Towards a Framework for Engineering Smart-Grid-Specific Privacy Requirements

    Privacy has become a critical topic in the engineering of electric systems. This paper proposes an approach for smart-grid-specific privacy requirements engineering by extending previous general privacy requirements engineering frameworks. The proposed extension goes one step further by focusing on privacy in the smart grid. An alignment of smart grid...

    Provided By University of Antwerp

  • White Papers // Jul 2013

    The Role of User Interaction and Acceptance in a Cloud-Based Demand Response Model

    Demand response management is one of the key applications of future energy systems. Most of the corresponding models and algorithms require a certain amount of user interaction to define appliances and rules for these processes. In this paper the authors implemented a cloud-based demand response approach to evaluate its efficiency...

    Provided By University of Antwerp

  • White Papers // May 2013

    Evaluation of Business Processes for Business Process Standardization

    Companies often implement multiple process variants in their organizations at the same time. Often these variants differ widely in terms of efficiency, quality and cycle time. In times of highly volatile global economic markets, companies cannot afford unnecessary redundant business processes. Business Process Standardization has therefore become a major topic...

    Provided By University of Antwerp

  • White Papers // Mar 2013

    Does Query Performance Optimization Lead to Energy Efficiency?

    With the continuous increase of online services as well as energy costs, energy consumption becomes a significant cost factor for the evaluation of data center operations. A significant contributor to that is the performance of database servers which are found to constitute the backbone of online services. From a software...

    Provided By University of Antwerp

  • White Papers // Mar 2013

    Evidence and Cloud Computing: The Virtual Machine Introspection Approach

    Cloud forensics refers to digital forensics investigations performed in cloud computing environments. Now-a-days digital investigators face various technical, legal, and organizational challenges to keep up with current developments in the field of cloud computing. But, due to its dynamic nature, cloud computing also offers several opportunities to improve digital investigations...

    Provided By University of Antwerp

  • White Papers // Jan 2013

    A Wavelet-Based Approach to End-User Privacy in Smart Metering

    Analysis of smart grid pilot projects in various countries shows that end-users at this point in time are hesitant to accept smart grid technologies. A critical issue mentioned repeatedly by end-users is the perceived lack of privacy. Smart metering is a core component in the smart grid end-user domain. Load...

    Provided By University of Antwerp

  • White Papers // Jan 2013

    Business Benefits And Application Capabilities Enabled By In-Memory Data Management

    Current developments in the area of in-memory data management can significantly change the way business applications will be used in the future. Thus, it will be possible to store huge volumes of single documents directly in main memory for high-speed processing. To introduce and evolve in-memory data management successfully, it...

    Provided By University of Antwerp

  • White Papers // Dec 2012

    Business Model and Performance of Firms

    This paper proposes to clarify the concept of business model, its usage and how it can contribute to the firm's value creation. The literature review shows a board diversity of definitions and application complexity in the firm. The paper identifies the emergence of the business model and how it evolves...

    Provided By University of Antwerp

  • White Papers // Dec 2012

    Wavelet-Based Load Profile Representation for Smart Meter Privacy

    A significant portion of (potential) end-users at this point in time are wary about possible disadvantages of smart grid technologies. A critical issue raised by end-users in various studies is the lack of trust in the level of privacy. Smart metering is the component in the end-user domain around which...

    Provided By University of Antwerp

  • White Papers // Nov 2012

    Unitary Precoding for MIMO Interference Networks

    For MIMO interference networks, uncertainty in the spatial structure of interfering signals is a major source of performance degradation. In this paper, the authors promote the use of linear unitary precoding, as it can be designed such that downlink transmission becomes more robust. Optimizing linear unitary precoding is a combinatorial...

    Provided By University of Antwerp

  • White Papers // Nov 2012

    Mining Techniques in Network Security to Enhance Intrusion Detection Systems

    In intrusion detection systems, classifiers still suffer from several drawbacks such as data dimensionality and dominance, different network feature types, and data impact on the classification. In this paper two significant enhancements are presented to solve these drawbacks. The first enhancement is an improved feature selection using sequential backward search...

    Provided By University of Antwerp

  • White Papers // Sep 2012

    Large-Scale Analysis of Malware Downloaders

    Downloaders are malicious programs with the goal to subversively download and install malware (eggs) on a victim's machine. In this paper, the authors analyze and characterize 23 Windows-based malware downloaders. They first show a high diversity in downloaders' communication architectures (e.g., P2P), carrier protocols and encryption schemes. Using dynamic malware...

    Provided By University of Antwerp

  • White Papers // Jun 2012

    Assessing Semantic Consistency of Business Process Models

    Business process modeling has become an accepted means for designing and describing business operations. Thereby, consistency of business process models, i.e., the absence of modeling faults, is of upmost importance to organizations. This paper presents a concept and subsequent implementation for detecting faults in business process models and for computing...

    Provided By University of Antwerp

  • White Papers // Jun 2012

    Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?

    Software card emulation is a new approach to advance the interoperability of NFC with legacy contactless smartcard systems. It has been first introduced to NFC-enabled mobile phones by Research In Motion (RIM) on their BlackBerry platform. Software card emulation aims at opening and simplifying the complex and tightly controlled card...

    Provided By University of Antwerp

  • White Papers // May 2012

    Microsoft Office 365 - Cloud in Business Environment

    Cloud computing is based on the rent of architecture to perform various tasks, where all communications between a client and a computer in the "Cloud" provides by the Internet. More prevalent types of services in the cloud are: Software as a service - (SaaS), Platform as a service - (PaaS)...

    Provided By University of Antwerp

  • White Papers // Feb 2012

    Design and Prototype of a Train-to-Wayside Communication Architecture

    Telecommunication has become very important in modern society and seems to be almost omnipresent, making daily life easier, more pleasant and connecting people everywhere. It does not only connect people, but also machines, enhancing the efficiency of automated tasks and monitoring automated processes. In this paper the IBBT (Interdisciplinary Institute...

    Provided By University of Antwerp

  • White Papers // Feb 2012

    Accessible Business Process Modelling

    This paper concerns with the accessibility of Business Process Modelling tools (BPMo tools) and Business Process Modelling languages (BPMo languages). Therefore the reader will be introduced to business process management and the authors' motivation behind this inquiry. Afterwards, the paper will reflect problems when applying inaccessible BPMo tools. To illustrate...

    Provided By University of Antwerp

  • White Papers // Feb 2012

    Behavior-Based Malware Recognition

    Each month hundreds of thousands of new malware variants are discovered and need to be tediously analyzed by antivirus companies in order to understand and counteract the threat these malicious programs pose to IT infrastructure worldwide. The paper presented here addresses the problem of the lack of automated solutions for...

    Provided By University of Antwerp

  • White Papers // Jan 2012

    Analyzing the Impact of Neighbor Sensing on the Performance of the OLSR Protocol

    This paper presents an analysis of several neighbor sensing approaches for the OLSR routing protocol. While several performance studies of OLSR proceed this paper, few attention has been paid to the impact of neighbor sensing on the performance of ad hoc routing protocols. The goal of this paper is to...

    Provided By University of Antwerp

  • White Papers // Sep 2011

    Performance Comparison of Aggressive Push and Traditional Pull Strategies in Large Distributed Systems

    Distributed systems benefit substantially from the ability to exchange jobs between temporarily heavily and lightly loaded nodes. Depending on whether the lightly or heavily loaded nodes initiate the job exchange, such strategies are termed pull or push strategies. In this paper, the authors compare the performance of an aggressive push...

    Provided By University of Antwerp

  • White Papers // Aug 2011

    On the Effects of Interference Between Heterogeneous Sensor Network MAC Protocols

    The growing popularity of sensor networks has resulted in the creation of various MAC protocols, each optimized for a different set of application requirements. However, all of these heterogeneous MAC protocols are designed under the assumption that all nodes in the wireless environment use a common MAC protocol. When multiple...

    Provided By University of Antwerp

  • White Papers // Jul 2011

    Scaling in Cloud Environments

    Cloud computing can be defined as an abstraction of services from infrastructures (i.e. hardware), platforms and applications (i.e. software) by virtualization of resources. This paper describes two approaches to scaling in cloud environments - semi-automatic (also called by request) and automatic (also called on demand) - and explains why the...

    Provided By University of Antwerp

  • White Papers // Jul 2011

    Load Balancing and the Power of Preventive Probing

    Consider a randomized load balancing problem consisting of a large number n of server sites each equipped with K servers. Under the greedy policy, clients randomly probe a site to check whether there is still a server available. If not, d - 1 other sites are probed and the task...

    Provided By University of Antwerp

  • White Papers // Jul 2011

    Virtualization of Wireless LAN Infrastructures

    In wired Ethernet networks (IEEE 802.3), physical network interfaces can be connected to different network segments or shared among multiple virtual machines. In wireless LAN (IEEE 802.11) sharing wireless network interfaces is recognized to be a difficult task. However, virtualization can solve this problem. In this paper, the authors will...

    Provided By University of Antwerp

  • White Papers // Jan 2011

    Self-Optimisation of Admission Control and Handover Parameters in LTE

    In mobile cellular networks the HandOver (HO) algorithm is responsible for determining when calls of users that are moving from one cell to another are handed over from the former to the latter. The Admission Control (AC) algorithm, which is the algorithm that decides whether new (fresh or HO) calls...

    Provided By University of Antwerp

  • White Papers // Oct 2010

    Delay and Throughput Analysis of Tree Algorithms for Random Access Over Noisy Collision Channels

    The Successive Interference Cancellation Tree Algorithm with First Success (SICTA/FS) was specifically designed as a random access protocol over noisy collision channels. Given J users with an infinite buffer and subject to Poisson arrivals, SICTA/FS achieves throughputs as high as 0:6 if packet losses are allowed (up to 20%), while...

    Provided By University of Antwerp

  • White Papers // Sep 2010

    Wireless Sensor Network Interconnection Protocol

    Wireless Sensor Networks (WSNs) are at high speed gaining in popularity. Because of this increased adoption, the need for integration with existing technologies becomes more prominent. In practice, a WSN is often deployed in environments where both wired and wireless data networks are also present. Consider for instance a WSN...

    Provided By University of Antwerp

  • White Papers // Aug 2010

    Creating Customer Value Through SOA and Outsourcing: A NEBIC Approach

    This paper is an extension and a practical application approach of Wheeler's NEBIC theory (Net Enabled Business Innovation Cycle). NEBIC theory is a new approach in IS research and can be used for dynamic environment related to new technology. Firms can follow the market changes rapidly with support of the...

    Provided By University of Antwerp

  • White Papers // Aug 2010

    A Mean Field Model for an Optical Switch With a Large Number of Wavelengths and Centralized Partial Conversion

    This paper analyzes an optical switch with centralized partial wavelength conversion by means of a mean field model. The model can be used to approximate the behavior of a switch with a large number of output wavelengths, and it becomes more accurate as the number of wavelengths increases. At each...

    Provided By University of Antwerp

  • White Papers // Jul 2010

    User Survey on Phone Security and Usage

    Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a wide variety of data stored on the devices which could be a high security risk in case of unauthorized access. A comprehensive...

    Provided By University of Antwerp

  • White Papers // Jul 2010

    The Effect of Partial Conversion and Fiber Delay Lines in an OBS Switch With a Large Number of Wavelengt

    In this paper, the authors analyze an OBS switch endowed with both Wavelength Converters (WCs) and Fiber Delay Lines (FDLs) to resolve contention. They consider the case where the number of wavelengths is large by introducing a mean field model that provides exact results when the number of wavelengths tends...

    Provided By University of Antwerp

  • White Papers // Jun 2010

    Analyzing and Improving Reliability in Multi-Hop Body Sensor Networks

    Body Sensor Networks are an interesting emerging application of wireless sensor networks to improve healthcare and the Quality of Life. Current research has mainly focused on single-hop networks, although some works clearly show advantages of multi-hop architectures. In this paper, the authors model probabilistic connectivity in such multi-hop body sensor...

    Provided By University of Antwerp

  • White Papers // Jun 2010

    Software Assumptions Failure Tolerance: Role, Strategies, and Visions

    At the authors behest or otherwise, while their software is being executed, a huge variety of design assumptions is continuously matched with the truth of the current condition. While standards and tools exist to express and verify some of these assumptions, in practice most of them end up being either...

    Provided By University of Antwerp

  • White Papers // May 2010

    Numerical Solution of Polling Systems for Analyzing Networks on Chips

    This paper introduces a numerical solution method for a class of discrete-time polling systems by relying on the power method, Kronecker matrix representations and the shuffle algorithm. The class of polling models considered consists of several infinite pseudo queues, deterministic service times, Bernoulli service and Markovian routing and includes exhaustive,...

    Provided By University of Antwerp

  • White Papers // May 2010

    Design and Analysis of Multi-Carrier Multiple Access Systems Without Feedback

    In this paper, the authors study a multiple access system without feedback supporting multiple carriers for delay critical applications with a small loss tolerance. In such a system, users transmit R times within the next N timeslots, in order to improve their success probability. In an earlier work, they considered...

    Provided By University of Antwerp

  • White Papers // May 2010

    Binary TDMA Scheduler by Means of Egyptian Fractions for Real-Time WSNs on TMotes

    In Wireless Sensor Networks (WSNs), the user should not be bothered with configuring the network, depending on the kind of sensors that he/she is using. It should only be a matter of deploying the sensors and they should do the necessary effort to construct a network. Since most of these...

    Provided By University of Antwerp

  • White Papers // Nov 2012

    Unitary Precoding for MIMO Interference Networks

    For MIMO interference networks, uncertainty in the spatial structure of interfering signals is a major source of performance degradation. In this paper, the authors promote the use of linear unitary precoding, as it can be designed such that downlink transmission becomes more robust. Optimizing linear unitary precoding is a combinatorial...

    Provided By University of Antwerp

  • White Papers // Jun 2012

    Assessing Semantic Consistency of Business Process Models

    Business process modeling has become an accepted means for designing and describing business operations. Thereby, consistency of business process models, i.e., the absence of modeling faults, is of upmost importance to organizations. This paper presents a concept and subsequent implementation for detecting faults in business process models and for computing...

    Provided By University of Antwerp

  • White Papers // Jan 2008

    Life Cycle for Change Management in Business Processes Using Semantic Technologies

    In a fast changing market environment the task of reducing the downtime for change management of business processes has high importance. Ensuring that IT reflects the updated business requirement is an important task related to change management in software development. The authors present a methodology and system for changing SOA-based...

    Provided By University of Antwerp

  • White Papers // May 2013

    Evaluation of Business Processes for Business Process Standardization

    Companies often implement multiple process variants in their organizations at the same time. Often these variants differ widely in terms of efficiency, quality and cycle time. In times of highly volatile global economic markets, companies cannot afford unnecessary redundant business processes. Business Process Standardization has therefore become a major topic...

    Provided By University of Antwerp

  • White Papers // Jun 2012

    Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?

    Software card emulation is a new approach to advance the interoperability of NFC with legacy contactless smartcard systems. It has been first introduced to NFC-enabled mobile phones by Research In Motion (RIM) on their BlackBerry platform. Software card emulation aims at opening and simplifying the complex and tightly controlled card...

    Provided By University of Antwerp

  • White Papers // Mar 2013

    Does Query Performance Optimization Lead to Energy Efficiency?

    With the continuous increase of online services as well as energy costs, energy consumption becomes a significant cost factor for the evaluation of data center operations. A significant contributor to that is the performance of database servers which are found to constitute the backbone of online services. From a software...

    Provided By University of Antwerp

  • White Papers // Feb 2012

    Behavior-Based Malware Recognition

    Each month hundreds of thousands of new malware variants are discovered and need to be tediously analyzed by antivirus companies in order to understand and counteract the threat these malicious programs pose to IT infrastructure worldwide. The paper presented here addresses the problem of the lack of automated solutions for...

    Provided By University of Antwerp

  • White Papers // Jul 2013

    ANANAS - A Framework For Analyzing Android Applications

    Android is an open software platform for mobile devices with a large market share in the Smartphone sector. The openness of the system as well as its wide adoption lead to an increasing amount of malware developed for this platform. ANANAS is an expandable and modular framework for analyzing Android...

    Provided By University of Antwerp

  • White Papers // Jul 2013

    The Role of User Interaction and Acceptance in a Cloud-Based Demand Response Model

    Demand response management is one of the key applications of future energy systems. Most of the corresponding models and algorithms require a certain amount of user interaction to define appliances and rules for these processes. In this paper the authors implemented a cloud-based demand response approach to evaluate its efficiency...

    Provided By University of Antwerp

  • White Papers // Jul 2013

    Towards a Framework for Engineering Smart-Grid-Specific Privacy Requirements

    Privacy has become a critical topic in the engineering of electric systems. This paper proposes an approach for smart-grid-specific privacy requirements engineering by extending previous general privacy requirements engineering frameworks. The proposed extension goes one step further by focusing on privacy in the smart grid. An alignment of smart grid...

    Provided By University of Antwerp

  • White Papers // Aug 2013

    Multi-Resolution Load Curve Representation with Privacy-Preserving Aggregation

    The availability of individual load curves per household in the smart grid end-user domain combined with nonintrusive load monitoring to infer personal data from these load curves has led to privacy concerns. Two types of approaches show high potential to resolve this issue: secure aggregation and multi-resolution representation with conditional...

    Provided By University of Antwerp

  • White Papers // Oct 2013

    Privacy-Preserving Smart Metering: Methods and Applicability

    Privacy-sensitive information can be extracted from the load data which is available in high resolution in smart metering. A number of approaches to Privacy-Enhancing Technologies (PET) have been suggested to provide privacy in smart metering while maintaining (a certain level of) functionality. To date, most of these approaches have not...

    Provided By University of Antwerp

  • White Papers // Dec 2012

    Wavelet-Based Load Profile Representation for Smart Meter Privacy

    A significant portion of (potential) end-users at this point in time are wary about possible disadvantages of smart grid technologies. A critical issue raised by end-users in various studies is the lack of trust in the level of privacy. Smart metering is the component in the end-user domain around which...

    Provided By University of Antwerp

  • White Papers // Jan 2013

    A Wavelet-Based Approach to End-User Privacy in Smart Metering

    Analysis of smart grid pilot projects in various countries shows that end-users at this point in time are hesitant to accept smart grid technologies. A critical issue mentioned repeatedly by end-users is the perceived lack of privacy. Smart metering is a core component in the smart grid end-user domain. Load...

    Provided By University of Antwerp

  • White Papers // Jul 2010

    User Survey on Phone Security and Usage

    Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a wide variety of data stored on the devices which could be a high security risk in case of unauthorized access. A comprehensive...

    Provided By University of Antwerp

  • White Papers // Aug 2013

    Integrating Semantic Knowledge in Data Stream Processing

    Complex Event Processing (CEP) has been established as a well-suited software technology for processing high-frequent data streams. However, intelligent stream based systems must integrate stream data with semantical background knowledge. In this paper, the authors investigate different approaches on integrating stream data and semantic domain knowledge. In particular, they discuss...

    Provided By University of Antwerp

  • White Papers // Jun 2009

    Mapping SOA and Outsourcing on NEBIC: A Dynamic Capabilities Perspective Approach

    This paper is an extension and a practical application approach of Wheeler's NEBIC theory (Net Enabled Business Innovation Cycle). NEBIC theory is a new approach in IS research and can be used for dynamic environment related to new technology. Firms can follow the market changes rapidly with support of the...

    Provided By University of Antwerp

  • White Papers // Aug 2010

    Creating Customer Value Through SOA and Outsourcing: A NEBIC Approach

    This paper is an extension and a practical application approach of Wheeler's NEBIC theory (Net Enabled Business Innovation Cycle). NEBIC theory is a new approach in IS research and can be used for dynamic environment related to new technology. Firms can follow the market changes rapidly with support of the...

    Provided By University of Antwerp

  • White Papers // Mar 2010

    Resource Pricing in a Dynamic Multi-Commodity Market for Computational Resources

    The adoption of market-based principles in resource management systems for computational infrastructures such as grids and clusters allows for matching demand and supply for resources in a utility maximizing manner. As such, they offer a promise of producing more efficient resource allocations, compared to traditional system-centric approaches that do not...

    Provided By University of Antwerp

  • White Papers // Apr 2010

    Building Capabilities To Manage Strategic Alliances

    In recent years, academics have attributed alliance success to a firm's ability to successfully manage their alliances, also called their level of alliance capability. The authors like to contribute to this growing body of literature by verifying the impact of alliance capability on alliance performance and analyzing the drivers of...

    Provided By University of Antwerp

  • White Papers // Sep 2009

    Enabling Effective Alliance Capability Building

    In this paper the authors present an overview of the contingencies that enable effective alliance capability development. The research goal is to determinate those factors that contribute to an effective alliance knowledge management system. They consider both organization specific elements and external environmental factors and analyze how these factors drive...

    Provided By University of Antwerp

  • White Papers // Sep 2012

    Large-Scale Analysis of Malware Downloaders

    Downloaders are malicious programs with the goal to subversively download and install malware (eggs) on a victim's machine. In this paper, the authors analyze and characterize 23 Windows-based malware downloaders. They first show a high diversity in downloaders' communication architectures (e.g., P2P), carrier protocols and encryption schemes. Using dynamic malware...

    Provided By University of Antwerp

  • White Papers // Mar 2013

    Evidence and Cloud Computing: The Virtual Machine Introspection Approach

    Cloud forensics refers to digital forensics investigations performed in cloud computing environments. Now-a-days digital investigators face various technical, legal, and organizational challenges to keep up with current developments in the field of cloud computing. But, due to its dynamic nature, cloud computing also offers several opportunities to improve digital investigations...

    Provided By University of Antwerp

  • White Papers // Feb 2009

    Bandwidth Extension for Mixed Asynchronous Synchronous Speech Transmission

    Increasing the bandwidth of speech signals from the classical telephone bandwidth of 300-3400 Hz to the wider bandwidth of 50-7000 Hz results in increased intelligibility and naturalness. This work presents a low complexity and low latency bandwidth extension approach for speech coding that is suitable for mixed asynchronous and synchronous...

    Provided By University of Antwerp

  • White Papers // Jul 2011

    Virtualization of Wireless LAN Infrastructures

    In wired Ethernet networks (IEEE 802.3), physical network interfaces can be connected to different network segments or shared among multiple virtual machines. In wireless LAN (IEEE 802.11) sharing wireless network interfaces is recognized to be a difficult task. However, virtualization can solve this problem. In this paper, the authors will...

    Provided By University of Antwerp

  • White Papers // May 2012

    Microsoft Office 365 - Cloud in Business Environment

    Cloud computing is based on the rent of architecture to perform various tasks, where all communications between a client and a computer in the "Cloud" provides by the Internet. More prevalent types of services in the cloud are: Software as a service - (SaaS), Platform as a service - (PaaS)...

    Provided By University of Antwerp

  • White Papers // Dec 2012

    Business Model and Performance of Firms

    This paper proposes to clarify the concept of business model, its usage and how it can contribute to the firm's value creation. The literature review shows a board diversity of definitions and application complexity in the firm. The paper identifies the emergence of the business model and how it evolves...

    Provided By University of Antwerp

  • White Papers // Jul 2011

    Scaling in Cloud Environments

    Cloud computing can be defined as an abstraction of services from infrastructures (i.e. hardware), platforms and applications (i.e. software) by virtualization of resources. This paper describes two approaches to scaling in cloud environments - semi-automatic (also called by request) and automatic (also called on demand) - and explains why the...

    Provided By University of Antwerp

  • White Papers // Feb 2012

    Accessible Business Process Modelling

    This paper concerns with the accessibility of Business Process Modelling tools (BPMo tools) and Business Process Modelling languages (BPMo languages). Therefore the reader will be introduced to business process management and the authors' motivation behind this inquiry. Afterwards, the paper will reflect problems when applying inaccessible BPMo tools. To illustrate...

    Provided By University of Antwerp

  • White Papers // Jan 2013

    Business Benefits And Application Capabilities Enabled By In-Memory Data Management

    Current developments in the area of in-memory data management can significantly change the way business applications will be used in the future. Thus, it will be possible to store huge volumes of single documents directly in main memory for high-speed processing. To introduce and evolve in-memory data management successfully, it...

    Provided By University of Antwerp

  • White Papers // Jul 2008

    Towards a Guidance Model for Business Integration Solutions

    This paper GuideBIS focuses on the development of efficient, cost- and time-reductive business integration solutions especially for Small and Medium Enterprises (SMEs), which increasingly are forced to implement more effective and efficient exchange of information and goods in value networks due to current business needs. In this project a guidance...

    Provided By University of Antwerp

  • White Papers // Jun 2010

    Software Assumptions Failure Tolerance: Role, Strategies, and Visions

    At the authors behest or otherwise, while their software is being executed, a huge variety of design assumptions is continuously matched with the truth of the current condition. While standards and tools exist to express and verify some of these assumptions, in practice most of them end up being either...

    Provided By University of Antwerp

  • White Papers // Jun 2010

    Analyzing and Improving Reliability in Multi-Hop Body Sensor Networks

    Body Sensor Networks are an interesting emerging application of wireless sensor networks to improve healthcare and the Quality of Life. Current research has mainly focused on single-hop networks, although some works clearly show advantages of multi-hop architectures. In this paper, the authors model probabilistic connectivity in such multi-hop body sensor...

    Provided By University of Antwerp

  • White Papers // Aug 2011

    On the Effects of Interference Between Heterogeneous Sensor Network MAC Protocols

    The growing popularity of sensor networks has resulted in the creation of various MAC protocols, each optimized for a different set of application requirements. However, all of these heterogeneous MAC protocols are designed under the assumption that all nodes in the wireless environment use a common MAC protocol. When multiple...

    Provided By University of Antwerp

  • White Papers // Oct 2010

    Delay and Throughput Analysis of Tree Algorithms for Random Access Over Noisy Collision Channels

    The Successive Interference Cancellation Tree Algorithm with First Success (SICTA/FS) was specifically designed as a random access protocol over noisy collision channels. Given J users with an infinite buffer and subject to Poisson arrivals, SICTA/FS achieves throughputs as high as 0:6 if packet losses are allowed (up to 20%), while...

    Provided By University of Antwerp

  • White Papers // May 2010

    Numerical Solution of Polling Systems for Analyzing Networks on Chips

    This paper introduces a numerical solution method for a class of discrete-time polling systems by relying on the power method, Kronecker matrix representations and the shuffle algorithm. The class of polling models considered consists of several infinite pseudo queues, deterministic service times, Bernoulli service and Markovian routing and includes exhaustive,...

    Provided By University of Antwerp

  • White Papers // May 2010

    Design and Analysis of Multi-Carrier Multiple Access Systems Without Feedback

    In this paper, the authors study a multiple access system without feedback supporting multiple carriers for delay critical applications with a small loss tolerance. In such a system, users transmit R times within the next N timeslots, in order to improve their success probability. In an earlier work, they considered...

    Provided By University of Antwerp

  • White Papers // Sep 2010

    Wireless Sensor Network Interconnection Protocol

    Wireless Sensor Networks (WSNs) are at high speed gaining in popularity. Because of this increased adoption, the need for integration with existing technologies becomes more prominent. In practice, a WSN is often deployed in environments where both wired and wireless data networks are also present. Consider for instance a WSN...

    Provided By University of Antwerp

  • White Papers // Mar 2010

    A Survey on Wireless Body Area Networks

    The increasing use of wireless networks and the constant miniaturization of electrical devices have empowered the development of Wireless Body Area Networks (WBANs). In these networks various sensors are attached on clothing or on the body or even implanted under the skin. The wireless nature of the network and the...

    Provided By University of Antwerp

  • White Papers // May 2010

    Binary TDMA Scheduler by Means of Egyptian Fractions for Real-Time WSNs on TMotes

    In Wireless Sensor Networks (WSNs), the user should not be bothered with configuring the network, depending on the kind of sensors that he/she is using. It should only be a matter of deploying the sensors and they should do the necessary effort to construct a network. Since most of these...

    Provided By University of Antwerp