University of Cadiz

Displaying 1-7 of 7 results

  • White Papers // Jan 2013

    Designing Routing and Message-Dependent Deadlock Free Networks on Chips

    Networks-on-Chip (NoC) have emerged as the paradigm for designing scalable communication architecture for Systems-on-Chips (SoCs). Avoiding the conditions that can lead to deadlocks in the network is critical for using NoCs in real designs. Methods that can lead to deadlock-free operation with minimum power and area overhead are important for...

    Provided By University of Cadiz

  • White Papers // May 2012

    A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks

    The authors consider the scenario of a Wireless Sensor Networks (WSN) where the nodes are equipped with a programmable middleware that allows for quickly deploying different applications running on top of it so as to follow the changing ambient needs. They then address the problem of finding the optimal deployment...

    Provided By University of Cadiz

  • White Papers // May 2012

    Rate Control Based on Reduced-Reference Image Quality Estimation for Streaming Video Over Wireless Channels

    The authors propose a source-rate control scheme for streaming video over a wireless channel. The scheme is designed to maximize the quality of the decoded video as perceived at the user-side by resorting on a reduced-reference video-quality estimation approach. The advantage is that the measured video quality, which drives the...

    Provided By University of Cadiz

  • White Papers // Dec 2010

    HMMPayl: An Intrusion Detection System Based on Hidden Markov Models

    Now-a-days the security of Web applications is one of the key topics in computer security. Among all the solutions that have been proposed so far, the analysis of the HTTP payload at the byte level has proven to be effective as it does not require the detailed knowledge of the...

    Provided By University of Cadiz

  • White Papers // Sep 2010

    Detection of Server-Side Web Attacks

    Web servers and server-side applications constitute the key components of modern Internet services. The authors present a pattern recognition system to the detection of intrusion attempts that target such components. Their system is anomaly-based, i.e., they model the normal (legitimate) traffic and intrusion attempts are identified as anomalous traffic. In...

    Provided By University of Cadiz

  • White Papers // May 2010

    Inference of Performance Annotations in Web Service Composition Models

    High-quality services must keep working reliably and efficiently, and service compositions are no exception. As they integrate several internal and external services over the network, they need to be carefully designed to meet their performance requirements. Current approaches assist developers in estimating whether the selected services can fulfill those requirements....

    Provided By University of Cadiz

  • White Papers // Oct 2009

    Evaluating Peer Churn Effects on P2P-Based Video-on-Demand Services

    In this paper, the authors investigate the effects of peer churns in Peer-To-Peer networks when used to provide video-on-demand services. To evaluate the impact of user behavior in terms of server load and peer satisfaction, three system models have been developed, which are based on: the Gilbert-Elliot chain, the fluidic...

    Provided By University of Cadiz

  • White Papers // Oct 2009

    Evaluating Peer Churn Effects on P2P-Based Video-on-Demand Services

    In this paper, the authors investigate the effects of peer churns in Peer-To-Peer networks when used to provide video-on-demand services. To evaluate the impact of user behavior in terms of server load and peer satisfaction, three system models have been developed, which are based on: the Gilbert-Elliot chain, the fluidic...

    Provided By University of Cadiz

  • White Papers // May 2012

    A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks

    The authors consider the scenario of a Wireless Sensor Networks (WSN) where the nodes are equipped with a programmable middleware that allows for quickly deploying different applications running on top of it so as to follow the changing ambient needs. They then address the problem of finding the optimal deployment...

    Provided By University of Cadiz

  • White Papers // May 2012

    Rate Control Based on Reduced-Reference Image Quality Estimation for Streaming Video Over Wireless Channels

    The authors propose a source-rate control scheme for streaming video over a wireless channel. The scheme is designed to maximize the quality of the decoded video as perceived at the user-side by resorting on a reduced-reference video-quality estimation approach. The advantage is that the measured video quality, which drives the...

    Provided By University of Cadiz

  • White Papers // May 2010

    Inference of Performance Annotations in Web Service Composition Models

    High-quality services must keep working reliably and efficiently, and service compositions are no exception. As they integrate several internal and external services over the network, they need to be carefully designed to meet their performance requirements. Current approaches assist developers in estimating whether the selected services can fulfill those requirements....

    Provided By University of Cadiz

  • White Papers // Dec 2010

    HMMPayl: An Intrusion Detection System Based on Hidden Markov Models

    Now-a-days the security of Web applications is one of the key topics in computer security. Among all the solutions that have been proposed so far, the analysis of the HTTP payload at the byte level has proven to be effective as it does not require the detailed knowledge of the...

    Provided By University of Cadiz

  • White Papers // Sep 2010

    Detection of Server-Side Web Attacks

    Web servers and server-side applications constitute the key components of modern Internet services. The authors present a pattern recognition system to the detection of intrusion attempts that target such components. Their system is anomaly-based, i.e., they model the normal (legitimate) traffic and intrusion attempts are identified as anomalous traffic. In...

    Provided By University of Cadiz

  • White Papers // Jan 2013

    Designing Routing and Message-Dependent Deadlock Free Networks on Chips

    Networks-on-Chip (NoC) have emerged as the paradigm for designing scalable communication architecture for Systems-on-Chips (SoCs). Avoiding the conditions that can lead to deadlocks in the network is critical for using NoCs in real designs. Methods that can lead to deadlock-free operation with minimum power and area overhead are important for...

    Provided By University of Cadiz