University of Bergen

Displaying 1-24 of 24 results

  • White Papers // May 2013

    Perspectives on the Adoption/rejection of Innovative Technologies Revisited - Insights From the Is Outsourcing Context

    Adoption of innovative technologies has been investigated using different theoretical perspectives for many years. In the research field of Management, Abrahamson has suggested four perspectives to explain the adoption/rejection behavior. Similarly, in the authors' field, Fichman has provided them with different adoption perspectives. A review and comparison of these adoption...

    Provided By University of Bergen

  • White Papers // May 2013

    Energy Efficiency Issues in Information-Centric Networking

    In this paper, the authors address energy efficiency issues of Information Centric Networking (ICN) architectures. In the proposed framework, they investigate the impact of ICN architectures on energy consumption of networking hardware devices and compare them with the energy consumption of other content dissemination methods. In particular, they investigate the...

    Provided By University of Bergen

  • White Papers // Apr 2013

    Real-World Energy Measurements of a Wireless Mesh Network

    Over the past several years the topics of energy consumption and energy harvesting have gained significant importance as a means for improved operation of wireless sensor and mesh networks. Energy-awareness of operation is especially relevant for application scenarios from the domain of environmental monitoring in hard to access areas. In...

    Provided By University of Bergen

  • White Papers // Mar 2013

    TDOA-Based Localization System with Narrow-band Signals

    Indoor localization has turned into a field of research densely populated with studies covering a large range of technologies, system designs and localization algorithms. Simply adopting outdoor solutions is not feasible but it is possible to adapt existing algorithms for outdoor positioning to cope with the specifics of indoor environments....

    Provided By University of Bergen

  • White Papers // Mar 2013

    A Reliable, Traffic-Adaptive and Energy-Efficient Link Layer for Wireless Sensor Networks

    The paper presents a link layer stack for wireless sensor networks, which consists of the Burst-aware Energy-efficient Adaptive Medium access control (BEAM) and the Hop-To-Hop Reliability (H2HR) protocol. BEAM can operate with short beacons to announce data transmissions or include data within the beacons. Duty cycles can be adapted by...

    Provided By University of Bergen

  • White Papers // Mar 2013

    Topology and Link Quality-aware Geographical Opportunistic Routing in Wireless Ad-hoc Networks

    Opportunistic Routing (OR) takes advantage of the broadcast nature and spatial diversity of wireless transmission to improve the performance of wireless ad-hoc networks. Instead of using a predetermined path to send packets, OR postpones the choice of the next-hop to the receiver side, and lets the multiple receivers of a...

    Provided By University of Bergen

  • White Papers // Mar 2013

    QoE-Aware Multiple Path Video Transmission for Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSNs) promise a wide scope of emerging potential applications in both civilian and military areas, which require visual and audio information to enhance the level of collected information. The transmission of multimedia content requires a minimal video quality level from the user's perspective. However, links in...

    Provided By University of Bergen

  • White Papers // Mar 2013

    SLA-Driven Predictive Orchestration for Distributed Cloud-Based Mobile Services

    The authors describe a system for performing SLA-driven management and orchestration of distributed infrastructures composed of services supporting mobile computing use cases. In particular, they focus on a Follow-Me Cloud scenario in which they consider mobile users accessing cloud-enable services. They combine a SLA-driven approach to infrastructure optimization, with forecast-based...

    Provided By University of Bergen

  • White Papers // Mar 2013

    User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds

    The intention of an Authentication and Authorization Infrastructure (AAI) is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and authorization infrastructure is a standards-based, open source software package for web Single Sign-On (SSO)...

    Provided By University of Bergen

  • White Papers // Jan 2013

    Disseminating WMSN Data by Using Social Network and Web

    For smart cities applications, a key requirement is to disseminate data collected from both scalar and multimedia wireless sensor networks to thousands of end-users. Furthermore, the information must be delivered to non-specialist users in a simple, intuitive and transparent manner. In this paper, the authors present Sensor4Cities, a user-friendly tool...

    Provided By University of Bergen

  • White Papers // Dec 2012

    A Hierarchical Multi-hop Multimedia Routing Protocol for Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSNs) play an important role in pervasive and ubiquitous systems. WMSNs promise a wide scope of potential applications in both civilian and military areas, which require visual and audio information such as environmental monitoring, smart parking, traffic control, and other applications for smart cities. The multimedia...

    Provided By University of Bergen

  • White Papers // Dec 2012

    Dynamic Topology Orchestration for Distributed Cloud-Based Applications

    This paper describes a specification language and architecture for managing distributed software and mapped compute, storage and network infrastructure services dynamically, beyond the state of the art in cloud computing. This is referred to as dynamic application topology orchestration, where the mapping and configuration of distributed, interconnected, interdependent application services...

    Provided By University of Bergen

  • White Papers // Dec 2012

    Dynamic SLA Management with Forecasting Using Multi-Objective Optimizations

    Cost-efficient operation while satisfying performance and availability guarantees in Service Level Agreements (SLAs) is a challenge for Cloud Computing, as these are potentially conflicting objectives. The authors present a framework for SLA management based on multi-objective optimizations. The framework features a forecasting model for determining the best virtual machine-to-host allocation...

    Provided By University of Bergen

  • White Papers // Oct 2012

    SLA-Driven Dynamic Orchestration and Composition for Distributed Cloud-Based Services

    The authors describe a specification language and architecture for managing distributed software and mapped compute, storage and network infrastructure services dynamically, beyond the state of the art in cloud computing. This is referred to as dynamic application topology orchestration, where the mapping and configuration of distributed, interconnected, interdependent application services...

    Provided By University of Bergen

  • White Papers // Oct 2012

    Content Discovery in Opportunistic Content-Centric Networks

    Host-based mobile ad hoc communication requires the transmission of periodic hello beacons to identify neighbors. Drawing conclusions from received beacons, e.g., containing information about existence and neighbor nodes, to available or demanded content is not possible and the gathered information may be outdated quickly due to dynamic environment changes. Therefore,...

    Provided By University of Bergen

  • White Papers // Sep 2012

    UAVNet: A Mobile Wireless Mesh Network Using Unmanned Aerial Vehicles

    The authors developed UAVNet, a framework for the autonomous deployment of a flying Wireless Mesh Network using small quadrocopter-based Unmanned Aerial Vehicles (UAVs). The flying wireless mesh nodes are automatically interconnected to each other and building an IEEE 802.11s wireless mesh network. The implemented UAVNet prototype is able to autonomously...

    Provided By University of Bergen

  • White Papers // Jul 2012

    QoE-Aware FEC Mechanism for Intrusion Detection in Multi-Tier Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSNs) play an important role in pervasive and ubiquitous systems. The multimedia content in such networks has the potential of enhancing the level of information collected, enlarging the range of coverage, and enabling multi-view support. For WMSN applications, the multi-tier network architecture has proven to be...

    Provided By University of Bergen

  • White Papers // Sep 2011

    Challenges in Wireless Bio-Sensor Based mHealth Development

    Healthcare providers are facing growing challenges in patient diagnostics and information gathering due to inadequate infrastructure and insufficient number of health-care professionals to perform such operations. The traditional way of patient information gathering is largely based on text and dependent on self-report surveys and infrequent doctor consultations. The proposed bio-sensor...

    Provided By University of Bergen

  • White Papers // Jun 2011

    Security Analysis of Two Distance-Bounding Protocols

    In this paper, the authors analyze the security of two recently proposed distance bounding protocols called the "Hitomi" and the "NUS" protocols. Their results show that the claimed security of both protocols has been overestimated. Namely, they show that the Hitomi protocol is susceptible to a full secret key disclosure...

    Provided By University of Bergen

  • White Papers // Mar 2011

    Long-term Fiscal Effects Of Public Pension Reform In Norway: A Generational Accounting Analysis

    Generational Accounts (GAs) measure the fiscal sustainability of the public sector. The authors ask whether the contributions from the Government Pension Fund and remaining oil and gas wealth in the ground, together with the pension reform taking effect in 2011, are sufficiently large to secure generational balance in Norway. Their...

    Provided By University of Bergen

  • White Papers // Jan 2011

    Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID

    Recently, Alomair et al. proposed the first UnConditionally Secure mutual authentication protocol for low-cost RFID systems (UCS- RFID). The security of the UCS-RFID relies on five dynamic secret keys which are updated at every protocol run using a fresh random number (Nonce) secretly transmitted from a reader to tags. The...

    Provided By University of Bergen

  • White Papers // Oct 2010

    On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack

    As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) protocol. In contrast to HB, NLHB relies on the complexity of decoding a class of non-linear codes to render the passive...

    Provided By University of Bergen

  • White Papers // Jan 2010

    Beyond Bidimensionality: Parameterized Subexponential Algorithms on Directed Graphs

    In 2000 Alber et al. obtained the first parameterized subexponential algorithm on undirected planar graphs by showing that k-DOMINATING SET is solvable in time 2O(pk)nO(1), where n is the input size. This result triggered an extensive study of parameterized problems on planar and more general classes of sparse graphs and...

    Provided By University of Bergen

  • White Papers // Jun 2009

    Expressive Modes and Species of Language

    Computer languages are usually lumped together into broad 'Paradigms', leaving one in want of a finer classification of kinds of languages. Theories distinguishing between 'Genuine differences' in language have been called for, and the authors propose that such differences can be observed through a notion of expressive mode. They outline...

    Provided By University of Bergen

  • White Papers // Jan 2013

    Disseminating WMSN Data by Using Social Network and Web

    For smart cities applications, a key requirement is to disseminate data collected from both scalar and multimedia wireless sensor networks to thousands of end-users. Furthermore, the information must be delivered to non-specialist users in a simple, intuitive and transparent manner. In this paper, the authors present Sensor4Cities, a user-friendly tool...

    Provided By University of Bergen

  • White Papers // Sep 2012

    UAVNet: A Mobile Wireless Mesh Network Using Unmanned Aerial Vehicles

    The authors developed UAVNet, a framework for the autonomous deployment of a flying Wireless Mesh Network using small quadrocopter-based Unmanned Aerial Vehicles (UAVs). The flying wireless mesh nodes are automatically interconnected to each other and building an IEEE 802.11s wireless mesh network. The implemented UAVNet prototype is able to autonomously...

    Provided By University of Bergen

  • White Papers // Dec 2012

    Dynamic Topology Orchestration for Distributed Cloud-Based Applications

    This paper describes a specification language and architecture for managing distributed software and mapped compute, storage and network infrastructure services dynamically, beyond the state of the art in cloud computing. This is referred to as dynamic application topology orchestration, where the mapping and configuration of distributed, interconnected, interdependent application services...

    Provided By University of Bergen

  • White Papers // Dec 2012

    A Hierarchical Multi-hop Multimedia Routing Protocol for Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSNs) play an important role in pervasive and ubiquitous systems. WMSNs promise a wide scope of potential applications in both civilian and military areas, which require visual and audio information such as environmental monitoring, smart parking, traffic control, and other applications for smart cities. The multimedia...

    Provided By University of Bergen

  • White Papers // Oct 2012

    SLA-Driven Dynamic Orchestration and Composition for Distributed Cloud-Based Services

    The authors describe a specification language and architecture for managing distributed software and mapped compute, storage and network infrastructure services dynamically, beyond the state of the art in cloud computing. This is referred to as dynamic application topology orchestration, where the mapping and configuration of distributed, interconnected, interdependent application services...

    Provided By University of Bergen

  • White Papers // Oct 2012

    Content Discovery in Opportunistic Content-Centric Networks

    Host-based mobile ad hoc communication requires the transmission of periodic hello beacons to identify neighbors. Drawing conclusions from received beacons, e.g., containing information about existence and neighbor nodes, to available or demanded content is not possible and the gathered information may be outdated quickly due to dynamic environment changes. Therefore,...

    Provided By University of Bergen

  • White Papers // Jul 2012

    QoE-Aware FEC Mechanism for Intrusion Detection in Multi-Tier Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSNs) play an important role in pervasive and ubiquitous systems. The multimedia content in such networks has the potential of enhancing the level of information collected, enlarging the range of coverage, and enabling multi-view support. For WMSN applications, the multi-tier network architecture has proven to be...

    Provided By University of Bergen

  • White Papers // Mar 2013

    QoE-Aware Multiple Path Video Transmission for Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSNs) promise a wide scope of emerging potential applications in both civilian and military areas, which require visual and audio information to enhance the level of collected information. The transmission of multimedia content requires a minimal video quality level from the user's perspective. However, links in...

    Provided By University of Bergen

  • White Papers // Mar 2013

    TDOA-Based Localization System with Narrow-band Signals

    Indoor localization has turned into a field of research densely populated with studies covering a large range of technologies, system designs and localization algorithms. Simply adopting outdoor solutions is not feasible but it is possible to adapt existing algorithms for outdoor positioning to cope with the specifics of indoor environments....

    Provided By University of Bergen

  • White Papers // May 2013

    Perspectives on the Adoption/rejection of Innovative Technologies Revisited - Insights From the Is Outsourcing Context

    Adoption of innovative technologies has been investigated using different theoretical perspectives for many years. In the research field of Management, Abrahamson has suggested four perspectives to explain the adoption/rejection behavior. Similarly, in the authors' field, Fichman has provided them with different adoption perspectives. A review and comparison of these adoption...

    Provided By University of Bergen

  • White Papers // Jan 2011

    Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID

    Recently, Alomair et al. proposed the first UnConditionally Secure mutual authentication protocol for low-cost RFID systems (UCS- RFID). The security of the UCS-RFID relies on five dynamic secret keys which are updated at every protocol run using a fresh random number (Nonce) secretly transmitted from a reader to tags. The...

    Provided By University of Bergen

  • White Papers // Jan 2010

    Beyond Bidimensionality: Parameterized Subexponential Algorithms on Directed Graphs

    In 2000 Alber et al. obtained the first parameterized subexponential algorithm on undirected planar graphs by showing that k-DOMINATING SET is solvable in time 2O(pk)nO(1), where n is the input size. This result triggered an extensive study of parameterized problems on planar and more general classes of sparse graphs and...

    Provided By University of Bergen

  • White Papers // Oct 2010

    On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack

    As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) protocol. In contrast to HB, NLHB relies on the complexity of decoding a class of non-linear codes to render the passive...

    Provided By University of Bergen

  • White Papers // Jun 2009

    Expressive Modes and Species of Language

    Computer languages are usually lumped together into broad 'Paradigms', leaving one in want of a finer classification of kinds of languages. Theories distinguishing between 'Genuine differences' in language have been called for, and the authors propose that such differences can be observed through a notion of expressive mode. They outline...

    Provided By University of Bergen

  • White Papers // Mar 2011

    Long-term Fiscal Effects Of Public Pension Reform In Norway: A Generational Accounting Analysis

    Generational Accounts (GAs) measure the fiscal sustainability of the public sector. The authors ask whether the contributions from the Government Pension Fund and remaining oil and gas wealth in the ground, together with the pension reform taking effect in 2011, are sufficiently large to secure generational balance in Norway. Their...

    Provided By University of Bergen

  • White Papers // Sep 2011

    Challenges in Wireless Bio-Sensor Based mHealth Development

    Healthcare providers are facing growing challenges in patient diagnostics and information gathering due to inadequate infrastructure and insufficient number of health-care professionals to perform such operations. The traditional way of patient information gathering is largely based on text and dependent on self-report surveys and infrequent doctor consultations. The proposed bio-sensor...

    Provided By University of Bergen

  • White Papers // Jun 2011

    Security Analysis of Two Distance-Bounding Protocols

    In this paper, the authors analyze the security of two recently proposed distance bounding protocols called the "Hitomi" and the "NUS" protocols. Their results show that the claimed security of both protocols has been overestimated. Namely, they show that the Hitomi protocol is susceptible to a full secret key disclosure...

    Provided By University of Bergen

  • White Papers // Mar 2013

    Topology and Link Quality-aware Geographical Opportunistic Routing in Wireless Ad-hoc Networks

    Opportunistic Routing (OR) takes advantage of the broadcast nature and spatial diversity of wireless transmission to improve the performance of wireless ad-hoc networks. Instead of using a predetermined path to send packets, OR postpones the choice of the next-hop to the receiver side, and lets the multiple receivers of a...

    Provided By University of Bergen

  • White Papers // Mar 2013

    SLA-Driven Predictive Orchestration for Distributed Cloud-Based Mobile Services

    The authors describe a system for performing SLA-driven management and orchestration of distributed infrastructures composed of services supporting mobile computing use cases. In particular, they focus on a Follow-Me Cloud scenario in which they consider mobile users accessing cloud-enable services. They combine a SLA-driven approach to infrastructure optimization, with forecast-based...

    Provided By University of Bergen

  • White Papers // Dec 2012

    Dynamic SLA Management with Forecasting Using Multi-Objective Optimizations

    Cost-efficient operation while satisfying performance and availability guarantees in Service Level Agreements (SLAs) is a challenge for Cloud Computing, as these are potentially conflicting objectives. The authors present a framework for SLA management based on multi-objective optimizations. The framework features a forecasting model for determining the best virtual machine-to-host allocation...

    Provided By University of Bergen

  • White Papers // Mar 2013

    A Reliable, Traffic-Adaptive and Energy-Efficient Link Layer for Wireless Sensor Networks

    The paper presents a link layer stack for wireless sensor networks, which consists of the Burst-aware Energy-efficient Adaptive Medium access control (BEAM) and the Hop-To-Hop Reliability (H2HR) protocol. BEAM can operate with short beacons to announce data transmissions or include data within the beacons. Duty cycles can be adapted by...

    Provided By University of Bergen

  • White Papers // Apr 2013

    Real-World Energy Measurements of a Wireless Mesh Network

    Over the past several years the topics of energy consumption and energy harvesting have gained significant importance as a means for improved operation of wireless sensor and mesh networks. Energy-awareness of operation is especially relevant for application scenarios from the domain of environmental monitoring in hard to access areas. In...

    Provided By University of Bergen

  • White Papers // May 2013

    Energy Efficiency Issues in Information-Centric Networking

    In this paper, the authors address energy efficiency issues of Information Centric Networking (ICN) architectures. In the proposed framework, they investigate the impact of ICN architectures on energy consumption of networking hardware devices and compare them with the energy consumption of other content dissemination methods. In particular, they investigate the...

    Provided By University of Bergen

  • White Papers // Mar 2013

    User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds

    The intention of an Authentication and Authorization Infrastructure (AAI) is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and authorization infrastructure is a standards-based, open source software package for web Single Sign-On (SSO)...

    Provided By University of Bergen