University of Camerino

Displaying 1-29 of 29 results

  • White Papers // Oct 2013

    Reliability of Erasure Coded Storage Systems: A Geometric Approach

    The authors consider the probability of data loss in an erasure coded distributed storage system. Data loss in an erasure coded system depends on the repair duration and the failure probability of individual disks. This dependence on the repair duration complicates the data loss probability analysis. In previous work, the...

    Provided By University of Camerino

  • White Papers // Aug 2013

    Machine Learning Methods for Spamdexing Detection

    In this paper, the authors present recent contributions for the battle against one of the main problems faced by search engines: the spamdexing or web spamming. They are malicious techniques used in web pages with the purpose of circumvent the search engines in order to achieve good visibility in search...

    Provided By University of Camerino

  • White Papers // Dec 2012

    A Methodology for Management of Cloud Computing Using Security Criteria

    Desirable requirements of cloud computing are to avoid wasting underused resources and increasing response time due to shortage of resources. The authors notice that recent literature in the field prioritizes the administration of resource provisioning and the allocation algorithms for an energy-efficient management of cloud computing environments. Security metrics can...

    Provided By University of Camerino

  • White Papers // Nov 2012

    Neighborhood Search and Admission Control in Cooperative Caching Networks

    In-network caching of content is a popular technique for eliminating redundant traffic from the network and improve the performance of network applications. In this paper, the authors present a novel cooperative caching strategy to improve performance of in-network caches. Their cooperative scheme is composed of an admission policy for the...

    Provided By University of Camerino

  • White Papers // Sep 2012

    Approximate Similarity Search for Online Multimedia Services on Distributed CPU-GPU Platforms

    Similarity search in high-dimensional spaces is a pivotal operation found a variety of database applications. Recently, there has been an increase interest in similarity search for online content-based multimedia services. Those services, however, introduce new challenges with respect to the very large volumes of data that have to be indexed/searched,...

    Provided By University of Camerino

  • White Papers // May 2012

    A Hybrid Framework to Analyze Web and OS Malware

    Malicious programs (malware) cause serious security issues to home users and even to highly secured enterprise systems. The main infection vector currently used by attackers is the Internet. To improve the detection rate and to develop protection mechanisms, it is very important to analyze and study these threats. To this...

    Provided By University of Camerino

  • White Papers // May 2012

    Coping With Fluctuations in Resource Availability in Grid Networks

    Due to the fact that grid networks are nonproprietary systems, resource allocation mechanisms must cope with fluctuations in resource availability to guarantee the QoS requirements of the applications. Mechanisms are classified either as reactive mechanisms, which react to the fluctuations in run time, or as proactive mechanisms, which try to...

    Provided By University of Camerino

  • White Papers // May 2012

    Algorithm for Energy Efficient Lightpath Establishment in WDM Networks

    The problem of light-path provisioning in WDM optical networks has been extensively studied to reduce cost and blocking, but there is still a need of investigating this problem from a power consumption perspective. In this paper, the authors introduce a novel algorithm for IP/MPLS over WDM networks based on a...

    Provided By University of Camerino

  • White Papers // May 2012

    Approximated Algorithms for Mapping Virtual Networks on Network Substrates

    Network virtualization is a promising technique for building the Internet of the future since it enables the introduction of new features into network elements at low cost. An open issue in virtualization is how to search for an efficient mapping of virtual network elements onto those of the existing physical...

    Provided By University of Camerino

  • White Papers // May 2012

    Green Virtualized Networks

    The Future Internet demands energy efficient communication to cope with the ever increasing power consumption. Virtualization techniques have proved to be effective in reducing power consumption of network devices. An open issue in virtualization for green networking is the search for an energy-efficient mapping of virtual networks onto physical networks....

    Provided By University of Camerino

  • White Papers // May 2012

    Object Management Policies in P2P-CDN Networks

    In this paper, the authors study the effectiveness of object management policies based on users' personal signals, available on YouTube-like content distribution systems, for improving content availability in P2P-CDN networks. Three policies are introduced and evaluated using real data collected from YouTube video collection, the most accessed multimedia distribution sys-tem...

    Provided By University of Camerino

  • White Papers // Apr 2012

    Tracking Memory Writes for Malware Classification and Code Reuse Identification

    Malicious code (malware) is used to steal sensitive data, to attack corporate networks, and to deliver spam. To silently compromise systems and maintain their access, malware developers usually apply obfuscation techniques that result in a massive amount of malware variants and that can render static analysis approaches ineffective. To address...

    Provided By University of Camerino

  • White Papers // Jun 2011

    On the Amplitude of the Elasticity Offered by Public Cloud Computing Providers

    The cloud computing paradigm allows for the provision of Information Technology infrastructure in the form of a service that clients acquire on-demand and paying only for the amount of service that they actually consume. In particular, considering that the \"Area\" of a service request is given by the product between...

    Provided By University of Camerino

  • White Papers // Apr 2011

    Modelling Credit Risk For Innovative Firms: The Role Of Innovation Measures

    Financial constraints are particularly severe for R&D projects of SMEs, which cannot generally rely on equity markets and, in the EU, on a sufficiently developed VC industry. If innovative SMEs have to depend on banks to finance their R&D projects, it is particularly important to develop models able to estimate...

    Provided By University of Camerino

  • White Papers // Sep 2010

    Just in Time Clouds: Enabling Highly-Elastic Public Clouds Over Low Scale Amortized Resources

    In this paper, the authors address the problem of capacity planning for the provision of cloud data centers. Inspired by the Toyota's Just in Time (JiT) philosophy, they propose an alternative approach to assemble the computational infrastructure of a cloud computing provider using resources whose costs have already been absorbed...

    Provided By University of Camerino

  • White Papers // Aug 2010

    In-Packet Bloom Filter Based Data Center Networking with Distributed OpenFlow Controllers

    In this paper, the authors discuss a novel data center architecture based on load-balanced forwarding with in-packet Bloom filters enabled by two support services that distribute the directory and topology state of OpenFlow controller applications. By deploying an army of Rack Managers acting as OpenFlow controllers, the proposed architecture promises...

    Provided By University of Camerino

  • White Papers // Apr 2010

    Data Center Networking with In-Packet Bloom Filters

    In this paper, the authors describe a networking approach for cloud data center architectures based on a novel use of in-packet Bloom filters to encode randomized network paths. In order to meet the scalability, performance, cost and control goals of cloud infrastructures, innovation is called for at many areas of...

    Provided By University of Camerino

  • White Papers // Jan 2010

    An Identifier-Based Architecture for Native Vertical Handover Support

    The growing demand for ubiquitous computing lead manufactures to develop multi-band devices supporting different network access technologies, such as GSM, Wi-Fi, and UMTS. Although these devices support different access technologies, they lack of native vertical handover support, breaking any ongoing connections whenever users switch between access technologies. In this paper,...

    Provided By University of Camerino

  • White Papers // Oct 2009

    Uplink Scheduler and Admission Control for the IEEE 802.16 Standard

    To support the diversity of multimedia applications available on the Internet, the IEEE 802.16 standard defines four types of service flows and mechanisms for bandwidth requests by connections in the uplink direction. The first service flow, Unsolicited Grant Service (UGS), periodically receives fixed size grants without the need to request...

    Provided By University of Camerino

  • White Papers // Oct 2009

    An Optimal Batch Scheduling Algorithm for OBS Networks

    In this paper, the authors introduce an optimal batch scheduling algorithm for the scheduling of batches of bursts in optical burst switching networks. The algorithm, called BATCHOPT, considers both the requests being processed in the current batch and the requests previously scheduled in the search for an optimal solution. Moreover,...

    Provided By University of Camerino

  • White Papers // Oct 2009

    Fair and Efficient Dynamic Traffic Grooming Algorithm for WDM Mesh Networks

    Traffic grooming in Wavelength Division Multiplexing networks merges low-speed flows into large capacity pipes so that the bandwidth discrepancy between them will not lead to underutilization of resources. Dynamic grooming deals with requests for wavelength allocation based on a dynamic pattern of arrivals in contrast to the situation of static...

    Provided By University of Camerino

  • White Papers // Sep 2009

    IDSec: An Identification Layer Security Model

    Current security protocols such as IPSec and TLS/SSL provide security mechanisms to authenticate and protect the communication between end-hosts over the Internet. Nonetheless, the arise of new communication scenarios, e.g., mobility and heterogeneous networks has exposed some technical limitations of these protocols. Both protocols employ the IP address as end-host...

    Provided By University of Camerino

  • White Papers // May 2009

    Scheduling in Hybrid Clouds

    Schedulers for cloud computing determine on which processing resource jobs of a workflow should be allocated. In hybrid clouds, jobs can be allocated either on a private cloud or on a public cloud on a pay per use basis. The capacity of the communication channels connecting these two types of...

    Provided By University of Camerino

  • White Papers // Mar 2009

    Efficient Content Authentication in Publish/Subscribe Systems

    The publish/subscribe communication paradigm is an asynchronous communication model aimed at content retrieval regardless of its location. However, the dissociation between contents and their providers open security issues related to their authentication and integrity. This paper presents a security model based on Merkle trees to provide efficient content authentication and...

    Provided By University of Camerino

  • White Papers // Jan 2009

    Malware Distributed Collection and Pre-Classification System Using Honeypot Technology

    Malware has become a major threat in the last years due to the ease of spread through the Internet. Malware detection has become difficult with the use of compression, polymorphic methods and techniques to detect and disable security software. Those and other obfuscation techniques pose a problem for detection and...

    Provided By University of Camerino

  • White Papers // Dec 2008

    A Framework for Network Security System Design

    In this paper, the authors present a framework for network system development that introduces a new phase in the usual procedure: the network security design. The main goal of this phase is to bridge the gap between high-level security requirement analysis and the low-level system implementation through the generation of...

    Provided By University of Camerino

  • White Papers // Dec 2007

    An Architecture for Mobility Support in a Next Generation Internet

    The current internetworking architecture presents some limitations to naturally support mobility, security and multihoming. Among the limitations, the IP semantic overload seems to be a primary issue to be considered. In this paper, the authors present a next generation internetworking architecture to overcome the IP semantic overload by introducing an...

    Provided By University of Camerino

  • White Papers // Aug 2007

    Illumination Normalization Methods for Face Recognition

    Illumination is considered one of the most difficult tasks for face recognition. Variations caused by pose, expression, occlusion or illumination is highly nonlinear, and making the detection task extremely complex. Well known contrast enhancement algorithms, such as histogram equalization, are global methods which do not consider important image details applied...

    Provided By University of Camerino

  • White Papers // Apr 2006

    WISENEP: A Network Processor for Wireless Sensor Networks

    Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources and one or more base stations, which are much more powerful laptop-class nodes that connect the sensor nodes to the rest of the world. The advent of this technology over the last decade enables...

    Provided By University of Camerino

  • White Papers // Nov 2012

    Neighborhood Search and Admission Control in Cooperative Caching Networks

    In-network caching of content is a popular technique for eliminating redundant traffic from the network and improve the performance of network applications. In this paper, the authors present a novel cooperative caching strategy to improve performance of in-network caches. Their cooperative scheme is composed of an admission policy for the...

    Provided By University of Camerino

  • White Papers // Oct 2009

    Uplink Scheduler and Admission Control for the IEEE 802.16 Standard

    To support the diversity of multimedia applications available on the Internet, the IEEE 802.16 standard defines four types of service flows and mechanisms for bandwidth requests by connections in the uplink direction. The first service flow, Unsolicited Grant Service (UGS), periodically receives fixed size grants without the need to request...

    Provided By University of Camerino

  • White Papers // Oct 2009

    An Optimal Batch Scheduling Algorithm for OBS Networks

    In this paper, the authors introduce an optimal batch scheduling algorithm for the scheduling of batches of bursts in optical burst switching networks. The algorithm, called BATCHOPT, considers both the requests being processed in the current batch and the requests previously scheduled in the search for an optimal solution. Moreover,...

    Provided By University of Camerino

  • White Papers // Oct 2009

    Fair and Efficient Dynamic Traffic Grooming Algorithm for WDM Mesh Networks

    Traffic grooming in Wavelength Division Multiplexing networks merges low-speed flows into large capacity pipes so that the bandwidth discrepancy between them will not lead to underutilization of resources. Dynamic grooming deals with requests for wavelength allocation based on a dynamic pattern of arrivals in contrast to the situation of static...

    Provided By University of Camerino

  • White Papers // Dec 2012

    A Methodology for Management of Cloud Computing Using Security Criteria

    Desirable requirements of cloud computing are to avoid wasting underused resources and increasing response time due to shortage of resources. The authors notice that recent literature in the field prioritizes the administration of resource provisioning and the allocation algorithms for an energy-efficient management of cloud computing environments. Security metrics can...

    Provided By University of Camerino

  • White Papers // Apr 2011

    Modelling Credit Risk For Innovative Firms: The Role Of Innovation Measures

    Financial constraints are particularly severe for R&D projects of SMEs, which cannot generally rely on equity markets and, in the EU, on a sufficiently developed VC industry. If innovative SMEs have to depend on banks to finance their R&D projects, it is particularly important to develop models able to estimate...

    Provided By University of Camerino

  • White Papers // May 2012

    A Hybrid Framework to Analyze Web and OS Malware

    Malicious programs (malware) cause serious security issues to home users and even to highly secured enterprise systems. The main infection vector currently used by attackers is the Internet. To improve the detection rate and to develop protection mechanisms, it is very important to analyze and study these threats. To this...

    Provided By University of Camerino

  • White Papers // May 2012

    Coping With Fluctuations in Resource Availability in Grid Networks

    Due to the fact that grid networks are nonproprietary systems, resource allocation mechanisms must cope with fluctuations in resource availability to guarantee the QoS requirements of the applications. Mechanisms are classified either as reactive mechanisms, which react to the fluctuations in run time, or as proactive mechanisms, which try to...

    Provided By University of Camerino

  • White Papers // May 2012

    Algorithm for Energy Efficient Lightpath Establishment in WDM Networks

    The problem of light-path provisioning in WDM optical networks has been extensively studied to reduce cost and blocking, but there is still a need of investigating this problem from a power consumption perspective. In this paper, the authors introduce a novel algorithm for IP/MPLS over WDM networks based on a...

    Provided By University of Camerino

  • White Papers // May 2012

    Approximated Algorithms for Mapping Virtual Networks on Network Substrates

    Network virtualization is a promising technique for building the Internet of the future since it enables the introduction of new features into network elements at low cost. An open issue in virtualization is how to search for an efficient mapping of virtual network elements onto those of the existing physical...

    Provided By University of Camerino

  • White Papers // May 2012

    Green Virtualized Networks

    The Future Internet demands energy efficient communication to cope with the ever increasing power consumption. Virtualization techniques have proved to be effective in reducing power consumption of network devices. An open issue in virtualization for green networking is the search for an energy-efficient mapping of virtual networks onto physical networks....

    Provided By University of Camerino

  • White Papers // May 2012

    Object Management Policies in P2P-CDN Networks

    In this paper, the authors study the effectiveness of object management policies based on users' personal signals, available on YouTube-like content distribution systems, for improving content availability in P2P-CDN networks. Three policies are introduced and evaluated using real data collected from YouTube video collection, the most accessed multimedia distribution sys-tem...

    Provided By University of Camerino

  • White Papers // Sep 2012

    Approximate Similarity Search for Online Multimedia Services on Distributed CPU-GPU Platforms

    Similarity search in high-dimensional spaces is a pivotal operation found a variety of database applications. Recently, there has been an increase interest in similarity search for online content-based multimedia services. Those services, however, introduce new challenges with respect to the very large volumes of data that have to be indexed/searched,...

    Provided By University of Camerino

  • White Papers // Aug 2013

    Machine Learning Methods for Spamdexing Detection

    In this paper, the authors present recent contributions for the battle against one of the main problems faced by search engines: the spamdexing or web spamming. They are malicious techniques used in web pages with the purpose of circumvent the search engines in order to achieve good visibility in search...

    Provided By University of Camerino

  • White Papers // Jan 2009

    Malware Distributed Collection and Pre-Classification System Using Honeypot Technology

    Malware has become a major threat in the last years due to the ease of spread through the Internet. Malware detection has become difficult with the use of compression, polymorphic methods and techniques to detect and disable security software. Those and other obfuscation techniques pose a problem for detection and...

    Provided By University of Camerino

  • White Papers // Apr 2012

    Tracking Memory Writes for Malware Classification and Code Reuse Identification

    Malicious code (malware) is used to steal sensitive data, to attack corporate networks, and to deliver spam. To silently compromise systems and maintain their access, malware developers usually apply obfuscation techniques that result in a massive amount of malware variants and that can render static analysis approaches ineffective. To address...

    Provided By University of Camerino

  • White Papers // Dec 2008

    A Framework for Network Security System Design

    In this paper, the authors present a framework for network system development that introduces a new phase in the usual procedure: the network security design. The main goal of this phase is to bridge the gap between high-level security requirement analysis and the low-level system implementation through the generation of...

    Provided By University of Camerino

  • White Papers // Dec 2007

    An Architecture for Mobility Support in a Next Generation Internet

    The current internetworking architecture presents some limitations to naturally support mobility, security and multihoming. Among the limitations, the IP semantic overload seems to be a primary issue to be considered. In this paper, the authors present a next generation internetworking architecture to overcome the IP semantic overload by introducing an...

    Provided By University of Camerino

  • White Papers // Sep 2009

    IDSec: An Identification Layer Security Model

    Current security protocols such as IPSec and TLS/SSL provide security mechanisms to authenticate and protect the communication between end-hosts over the Internet. Nonetheless, the arise of new communication scenarios, e.g., mobility and heterogeneous networks has exposed some technical limitations of these protocols. Both protocols employ the IP address as end-host...

    Provided By University of Camerino

  • White Papers // Aug 2007

    Illumination Normalization Methods for Face Recognition

    Illumination is considered one of the most difficult tasks for face recognition. Variations caused by pose, expression, occlusion or illumination is highly nonlinear, and making the detection task extremely complex. Well known contrast enhancement algorithms, such as histogram equalization, are global methods which do not consider important image details applied...

    Provided By University of Camerino

  • White Papers // Mar 2009

    Efficient Content Authentication in Publish/Subscribe Systems

    The publish/subscribe communication paradigm is an asynchronous communication model aimed at content retrieval regardless of its location. However, the dissociation between contents and their providers open security issues related to their authentication and integrity. This paper presents a security model based on Merkle trees to provide efficient content authentication and...

    Provided By University of Camerino

  • White Papers // Jan 2010

    An Identifier-Based Architecture for Native Vertical Handover Support

    The growing demand for ubiquitous computing lead manufactures to develop multi-band devices supporting different network access technologies, such as GSM, Wi-Fi, and UMTS. Although these devices support different access technologies, they lack of native vertical handover support, breaking any ongoing connections whenever users switch between access technologies. In this paper,...

    Provided By University of Camerino

  • White Papers // Apr 2006

    WISENEP: A Network Processor for Wireless Sensor Networks

    Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources and one or more base stations, which are much more powerful laptop-class nodes that connect the sensor nodes to the rest of the world. The advent of this technology over the last decade enables...

    Provided By University of Camerino

  • White Papers // Apr 2010

    Data Center Networking with In-Packet Bloom Filters

    In this paper, the authors describe a networking approach for cloud data center architectures based on a novel use of in-packet Bloom filters to encode randomized network paths. In order to meet the scalability, performance, cost and control goals of cloud infrastructures, innovation is called for at many areas of...

    Provided By University of Camerino

  • White Papers // Aug 2010

    In-Packet Bloom Filter Based Data Center Networking with Distributed OpenFlow Controllers

    In this paper, the authors discuss a novel data center architecture based on load-balanced forwarding with in-packet Bloom filters enabled by two support services that distribute the directory and topology state of OpenFlow controller applications. By deploying an army of Rack Managers acting as OpenFlow controllers, the proposed architecture promises...

    Provided By University of Camerino

  • White Papers // May 2009

    Scheduling in Hybrid Clouds

    Schedulers for cloud computing determine on which processing resource jobs of a workflow should be allocated. In hybrid clouds, jobs can be allocated either on a private cloud or on a public cloud on a pay per use basis. The capacity of the communication channels connecting these two types of...

    Provided By University of Camerino

  • White Papers // Jun 2011

    On the Amplitude of the Elasticity Offered by Public Cloud Computing Providers

    The cloud computing paradigm allows for the provision of Information Technology infrastructure in the form of a service that clients acquire on-demand and paying only for the amount of service that they actually consume. In particular, considering that the \"Area\" of a service request is given by the product between...

    Provided By University of Camerino

  • White Papers // Sep 2010

    Just in Time Clouds: Enabling Highly-Elastic Public Clouds Over Low Scale Amortized Resources

    In this paper, the authors address the problem of capacity planning for the provision of cloud data centers. Inspired by the Toyota's Just in Time (JiT) philosophy, they propose an alternative approach to assemble the computational infrastructure of a cloud computing provider using resources whose costs have already been absorbed...

    Provided By University of Camerino

  • White Papers // Oct 2013

    Reliability of Erasure Coded Storage Systems: A Geometric Approach

    The authors consider the probability of data loss in an erasure coded distributed storage system. Data loss in an erasure coded system depends on the repair duration and the failure probability of individual disks. This dependence on the repair duration complicates the data loss probability analysis. In previous work, the...

    Provided By University of Camerino