University of Cincinnati

Displaying 1-30 of 30 results

  • White Papers // May 2013

    Blake2: Simpler, Smaller, Fast as MD5

    The authors present the hash function BLAKE2, an improved version of the SHA-3 finalist BLAKE optimized for speed in software. Target applications include cloud storage, intrusion detection, or version control systems. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms, and BLAKE2s for smaller architectures. On 64-...

    Provided By University of Cincinnati

  • White Papers // May 2013

    Business Processes the Way They Should Be: Tuning for Low Friction and Sustainability

    The authors propose an approach to find pain points in business processes, which may cause them to be ignored or be seen as a burden rather than a valuable orientation for everyday work. They evaluate four dimensions (Motivation, Understanding, Value, and Effort), using a customizable questionnaire that is answered by...

    Provided By University of Cincinnati

  • White Papers // May 2013

    Enhancing IEEE 802.11 Energy Efficiency for Continuous Media Applications

    This paper proposes the Optimized Power save Algorithm for continuous Media Applications (OPAMA) to improve end-user device energy efficiency. OPAMA enhances the standard legacy Power Save Mode (PSM) of IEEE 802.11 by taking into consideration application specific requirements combined with data aggregation techniques. By establishing a balanced cost/benefit tradeoff between...

    Provided By University of Cincinnati

  • White Papers // May 2013

    Cloud Computing Automation: Integrating USDL and TOSCA

    Standardization efforts to simplify the management of cloud applications are being conducted in isolation. The objective of this paper is to investigate to which extend two promising specifications, USDL and TOSCA, can be integrated to automate the lifecycle of cloud applications. In this paper, the authors selected a commercial SaaS...

    Provided By University of Cincinnati

  • White Papers // Mar 2013

    Ontological Representation and Governance of Business Semantics in Compliant Service Networks

    The Internet would enable new ways for service innovation and trading, as well as for analyzing the resulting value networks, with an unprecedented level of scale and dynamics. Yet most related economic activities remain of a largely brittle and manual nature. Service-oriented business implementations focus on operational aspects at the...

    Provided By University of Cincinnati

  • White Papers // Sep 2012

    Unplugg: A Cloud-Based Home Energy Management Platform

    The residential market represents an important part of the global energy consumption. However, it is one of the hardest places to improve the authors' energy efficiency. Several solutions exist with different approaches; however, their adoption and results are suboptimal. They believe that this occurs due to the fragmentation of the...

    Provided By University of Cincinnati

  • White Papers // Jul 2012

    Empowering End-Users to Manage Business Rules: The Case of a Graphical Environment Built for a Telco

    The authors present GREAT (GRaphical tool for rules Editing and AudiTing), an approach and a tool for graphical business rules management that they designed and developed. This collaborative Web-based application with rich user interface enables easy creation and editing of business rules. Relevant features are the ability to define templates...

    Provided By University of Cincinnati

  • White Papers // May 2012

    Modeling the Neighborhood Area Networks of the Smart Grid

    ICT and M2M communications will definitely play a key role on making the Smart Grid dream comes true. However, there are many available communications technologies that can be applied to this area, so an effective method to evaluate and compare them is required. Simulations represent a powerful, flexible, and cost-effective...

    Provided By University of Cincinnati

  • White Papers // May 2012

    Implementing BLAKE With AVX, AVX2, and XOP

    In 2013 Intel will release the AVX2 instructions, which introduce 256-bit Single-Instruction Multiple-Data (SIMD) integer arithmetic. This will enable desktop and server processors from this vendor to support 4-way SIMD computation of 64-bit add-rotate-xor algorithms, as well as 8-way 32-bit SIMD computations. AVX2 also includes interesting instructions for cryptographic functions,...

    Provided By University of Cincinnati

  • White Papers // Feb 2012

    Algebraic Attack on Lattice Based Cryptosystems Via Solving Equations Over Real Numbers

    In this paper, the authors present a new algorithm to attack lattice based cryptosystems by solving a problem over real numbers. In the case of the NTRU cryptosystem, if they assume the additional information on the modular operations, they can break the NTRU cryptosystems completely by getting the secret key....

    Provided By University of Cincinnati

  • White Papers // Jan 2012

    Improve Business Interoperability Through Context-Based Ontology Reconciliation

    In collaborative environment, providing flexible interoperation between heterogeneous knowledge-based software applications is critical for efficiency reasons, particularly in the context of unanticipated business collaborations. It is an objective pursued by ongoing research efforts on semantic interoperability: one expects that describing information within ontologies and reconciling these ontologies is sufficient to...

    Provided By University of Cincinnati

  • White Papers // Jan 2012

    Boosting the Reliability of Deterministic Broadcasting Protocols for MANETs

    A significant number of broadcasting protocols are unable to cope well with failures under a realistic scenario of momentary failures and topology changes. In order to enhance the capability of broadcasting algorithms to deal with this kind of faults, a new mechanism is proposed capable of identifying those neighboring links...

    Provided By University of Cincinnati

  • White Papers // Sep 2011

    A Survey on Data Security in Data Warehousing

    Data Warehouses (DWs) are the enterprise's most valuable assets in what concerns critical business information, making them an appealing target for malicious inside and outside attackers. Given the volume of data and the nature of DW queries, most of the existing data security solutions for databases are inefficient, consuming too...

    Provided By University of Cincinnati

  • White Papers // Sep 2011

    Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing Perspective

    Data Warehouses (DWs) are the core of enterprise sensitive data, which makes protecting confidentiality in DWs a critical task. Published research and best practice guides state that encryption is the best way to achieve this and maintain high performance. However, although encryption algorithms strongly fulfill their security purpose, the authors...

    Provided By University of Cincinnati

  • White Papers // Sep 2011

    Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses

    Data Warehouses (DWs) store the golden nuggets of the business, which makes them an appealing target. To ensure data privacy, encryption solutions have been used and proven efficient in their security purpose. However, they introduce massive storage space and performance overheads, making them unfeasible for DWs. The authors propose a...

    Provided By University of Cincinnati

  • White Papers // Sep 2011

    DBMS Application Layer Intrusion Detection for Data Warehouses

    Data Warehouses (DWs) are used for producing business knowledge and aiding decision support. Since they store the secrets of the business, securing their data is critical. To accomplish this, several Database Intrusion Detection Systems (DIDS) have been proposed. However, when using DIDS in DWs, most solutions either produce too many...

    Provided By University of Cincinnati

  • White Papers // Sep 2011

    Leveraging 24/7 Availability and Performance for Distributed Real-Time Data Warehouses

    Real-time Data Warehouses (DWs) must be able to deal with continuous updates while ensuring 24/7 availability. To improve their performance, distributing data using round-robin algorithms on clusters of shared-nothing machines is normally used. This paper proposes a solution for distributed DW databases that ensures its continuous availability and deals with...

    Provided By University of Cincinnati

  • White Papers // May 2011

    Towards Thresholds of Control Flow Complexity Measures for BPMN Models

    Business process models are considered to be a good mechanism for communication among stakeholders and are a key instrument in the analysis and design of information systems. It is therefore important to design business process models with a high level of quality, which can be discovered through measurement application. Several...

    Provided By University of Cincinnati

  • White Papers // May 2011

    Secure Group Key Management Approach Based Upon N-Dimensional Hyper-Sphere

    Secure group communication systems become more and more important in many emerging network applications. For a secure group communication system, an efficient and robust group key management approach is essential. In this paper, a new group key management approach with a group controller GC using the theory of hyper-sphere is...

    Provided By University of Cincinnati

  • White Papers // Mar 2011

    An Inherent Security Benefit of Analog Network Coding for the Detection of Byzantine Attacks in Multi-Hop Wireless Networks

    Modern multi-hop wireless networks employ a number of sophisticated schemes to secure the network against hostile attacks. However, constant improvements in any security mechanism is matched by ever increasing attacks. Therefore, there is a critical and constant need to develop newer innovative schemes, especially for applications where the integrity of...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    The Lonely NATed Node

    In this paper the authors take the position that current research in the area of distributed systems has all but forgotten about one of the largest collective Internet resources - the NATed node. These are hosts that are behind Network Address Translation (NAT) gateways and are hidden by the fact...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    Piconet Interference Modeling and Performance Evaluation of Bluetooth MAC Protocol

    The emergence of Bluetooth as a default radio interface has allowed handheld electronic devices to be instantly interconnected as ad-hoc networks. These short range ad-hoc wireless networks called piconets, operate in the unlicensed 2.45 GHz ISM (Industrial-Scientific-Medical) band where up to eight devices may be used to configure single or...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    SSA - Superblock-Based Storage Architecture: A New Approach for Boosting I/O Performance

    Many of the new I/O architectures like DCD, RAPID cache and LFS focus on improving the disk write performance. However, many I/O intensive applications are read-dominated or generate substantial number of read requests. A large read cache is not always effective and has diminishing returns when its size increases. In...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    UCFS - A Novel User-Space, High Performance, Customized File System For Web Proxy Servers

    Web proxy caching servers play a key role in today's Web infrastructure. Previous studies have shown that disk I/O is one of the major performance bottlenecks of proxy servers. Most conventional file systems do not work well for proxy server workloads and have high overheads. This paper presents a novel,...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    A Performance Study of E-Mail Services

    This paper presents a performance study of the ISP (Internet Service Provider) mail servers. By using the SPECmail2001 benchmark to test a commercial mail service MDaemon 5.0.1, the authors explore the both network and I/O performance of mail servers with user populations between 200 to 10,000. File system traces are...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    A User-Level, Temporary File System for Large Web Servers

    Several recent studies have pointed out that file I/Os can be a major performance bottleneck for some large web servers. Large I/O buffer caches often do not work effectively for large servers. This paper presents a novel, user-level, temporary file system called TFS that can effectively improve I/O performance for...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    The Design and Implementation of RAPID-Cache: A Reliable, Inexpensive, and High-Performance I/O Cache for Linux

    Most file system performance enhancing techniques, such as the I/O buffer cache and the Log-structured File Systems (LFS), relying on caching data in volatile RAM for a period of time before destaging them to disk. Such approaches pose a reliability problem. Non-volatile RAM (NVRAM) caches can be used to enhance...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems

    For the last three decades, public key cryptosystems, as a revolutionary break through in cryptography, have developed into an indispensable element of the modern communication system. For RSA and other number theory based cryptosystems, their security depends on the assumption about the difficulty of certain number theory problems, such as...

    Provided By University of Cincinnati

  • White Papers // Jan 2010

    Dead Reckoning in Mobile Ad Hoc Networks

    A predictive model-based mobility tracking method, called dead reckoning, is proposed for mobile ad hoc networks. It disseminates both location and movement models of mobile nodes in the network so that every node is able to predict or track the movement of every other node with a very low overhead....

    Provided By University of Cincinnati

  • White Papers // Dec 2009

    Optimizing System Services in Virtualized Machines for Improved Execution of Parallel Applications

    Hardware virtualization in the x86 architecture has enabled the use of virtual machine monitors in Beowulf clusters. In turn, each application user can then run a virtual guest operating system of his/her choice. Of course virtualizing and sharing the hardware resources in a Beowulf cluster will add additional overheads that...

    Provided By University of Cincinnati

  • White Papers // May 2012

    Implementing BLAKE With AVX, AVX2, and XOP

    In 2013 Intel will release the AVX2 instructions, which introduce 256-bit Single-Instruction Multiple-Data (SIMD) integer arithmetic. This will enable desktop and server processors from this vendor to support 4-way SIMD computation of 64-bit add-rotate-xor algorithms, as well as 8-way 32-bit SIMD computations. AVX2 also includes interesting instructions for cryptographic functions,...

    Provided By University of Cincinnati

  • White Papers // May 2013

    Enhancing IEEE 802.11 Energy Efficiency for Continuous Media Applications

    This paper proposes the Optimized Power save Algorithm for continuous Media Applications (OPAMA) to improve end-user device energy efficiency. OPAMA enhances the standard legacy Power Save Mode (PSM) of IEEE 802.11 by taking into consideration application specific requirements combined with data aggregation techniques. By establishing a balanced cost/benefit tradeoff between...

    Provided By University of Cincinnati

  • White Papers // May 2013

    Business Processes the Way They Should Be: Tuning for Low Friction and Sustainability

    The authors propose an approach to find pain points in business processes, which may cause them to be ignored or be seen as a burden rather than a valuable orientation for everyday work. They evaluate four dimensions (Motivation, Understanding, Value, and Effort), using a customizable questionnaire that is answered by...

    Provided By University of Cincinnati

  • White Papers // Jan 2010

    Dead Reckoning in Mobile Ad Hoc Networks

    A predictive model-based mobility tracking method, called dead reckoning, is proposed for mobile ad hoc networks. It disseminates both location and movement models of mobile nodes in the network so that every node is able to predict or track the movement of every other node with a very low overhead....

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    The Lonely NATed Node

    In this paper the authors take the position that current research in the area of distributed systems has all but forgotten about one of the largest collective Internet resources - the NATed node. These are hosts that are behind Network Address Translation (NAT) gateways and are hidden by the fact...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    Piconet Interference Modeling and Performance Evaluation of Bluetooth MAC Protocol

    The emergence of Bluetooth as a default radio interface has allowed handheld electronic devices to be instantly interconnected as ad-hoc networks. These short range ad-hoc wireless networks called piconets, operate in the unlicensed 2.45 GHz ISM (Industrial-Scientific-Medical) band where up to eight devices may be used to configure single or...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    SSA - Superblock-Based Storage Architecture: A New Approach for Boosting I/O Performance

    Many of the new I/O architectures like DCD, RAPID cache and LFS focus on improving the disk write performance. However, many I/O intensive applications are read-dominated or generate substantial number of read requests. A large read cache is not always effective and has diminishing returns when its size increases. In...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    UCFS - A Novel User-Space, High Performance, Customized File System For Web Proxy Servers

    Web proxy caching servers play a key role in today's Web infrastructure. Previous studies have shown that disk I/O is one of the major performance bottlenecks of proxy servers. Most conventional file systems do not work well for proxy server workloads and have high overheads. This paper presents a novel,...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    A Performance Study of E-Mail Services

    This paper presents a performance study of the ISP (Internet Service Provider) mail servers. By using the SPECmail2001 benchmark to test a commercial mail service MDaemon 5.0.1, the authors explore the both network and I/O performance of mail servers with user populations between 200 to 10,000. File system traces are...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    A User-Level, Temporary File System for Large Web Servers

    Several recent studies have pointed out that file I/Os can be a major performance bottleneck for some large web servers. Large I/O buffer caches often do not work effectively for large servers. This paper presents a novel, user-level, temporary file system called TFS that can effectively improve I/O performance for...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    The Design and Implementation of RAPID-Cache: A Reliable, Inexpensive, and High-Performance I/O Cache for Linux

    Most file system performance enhancing techniques, such as the I/O buffer cache and the Log-structured File Systems (LFS), relying on caching data in volatile RAM for a period of time before destaging them to disk. Such approaches pose a reliability problem. Non-volatile RAM (NVRAM) caches can be used to enhance...

    Provided By University of Cincinnati

  • White Papers // Jan 2011

    High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems

    For the last three decades, public key cryptosystems, as a revolutionary break through in cryptography, have developed into an indispensable element of the modern communication system. For RSA and other number theory based cryptosystems, their security depends on the assumption about the difficulty of certain number theory problems, such as...

    Provided By University of Cincinnati

  • White Papers // May 2011

    Secure Group Key Management Approach Based Upon N-Dimensional Hyper-Sphere

    Secure group communication systems become more and more important in many emerging network applications. For a secure group communication system, an efficient and robust group key management approach is essential. In this paper, a new group key management approach with a group controller GC using the theory of hyper-sphere is...

    Provided By University of Cincinnati

  • White Papers // Dec 2009

    Optimizing System Services in Virtualized Machines for Improved Execution of Parallel Applications

    Hardware virtualization in the x86 architecture has enabled the use of virtual machine monitors in Beowulf clusters. In turn, each application user can then run a virtual guest operating system of his/her choice. Of course virtualizing and sharing the hardware resources in a Beowulf cluster will add additional overheads that...

    Provided By University of Cincinnati

  • White Papers // Mar 2011

    An Inherent Security Benefit of Analog Network Coding for the Detection of Byzantine Attacks in Multi-Hop Wireless Networks

    Modern multi-hop wireless networks employ a number of sophisticated schemes to secure the network against hostile attacks. However, constant improvements in any security mechanism is matched by ever increasing attacks. Therefore, there is a critical and constant need to develop newer innovative schemes, especially for applications where the integrity of...

    Provided By University of Cincinnati

  • White Papers // Feb 2012

    Algebraic Attack on Lattice Based Cryptosystems Via Solving Equations Over Real Numbers

    In this paper, the authors present a new algorithm to attack lattice based cryptosystems by solving a problem over real numbers. In the case of the NTRU cryptosystem, if they assume the additional information on the modular operations, they can break the NTRU cryptosystems completely by getting the secret key....

    Provided By University of Cincinnati

  • White Papers // Jan 2012

    Boosting the Reliability of Deterministic Broadcasting Protocols for MANETs

    A significant number of broadcasting protocols are unable to cope well with failures under a realistic scenario of momentary failures and topology changes. In order to enhance the capability of broadcasting algorithms to deal with this kind of faults, a new mechanism is proposed capable of identifying those neighboring links...

    Provided By University of Cincinnati

  • White Papers // May 2012

    Modeling the Neighborhood Area Networks of the Smart Grid

    ICT and M2M communications will definitely play a key role on making the Smart Grid dream comes true. However, there are many available communications technologies that can be applied to this area, so an effective method to evaluate and compare them is required. Simulations represent a powerful, flexible, and cost-effective...

    Provided By University of Cincinnati

  • White Papers // May 2013

    Blake2: Simpler, Smaller, Fast as MD5

    The authors present the hash function BLAKE2, an improved version of the SHA-3 finalist BLAKE optimized for speed in software. Target applications include cloud storage, intrusion detection, or version control systems. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms, and BLAKE2s for smaller architectures. On 64-...

    Provided By University of Cincinnati

  • White Papers // May 2013

    Cloud Computing Automation: Integrating USDL and TOSCA

    Standardization efforts to simplify the management of cloud applications are being conducted in isolation. The objective of this paper is to investigate to which extend two promising specifications, USDL and TOSCA, can be integrated to automate the lifecycle of cloud applications. In this paper, the authors selected a commercial SaaS...

    Provided By University of Cincinnati

  • White Papers // Sep 2012

    Unplugg: A Cloud-Based Home Energy Management Platform

    The residential market represents an important part of the global energy consumption. However, it is one of the hardest places to improve the authors' energy efficiency. Several solutions exist with different approaches; however, their adoption and results are suboptimal. They believe that this occurs due to the fragmentation of the...

    Provided By University of Cincinnati

  • White Papers // Jul 2012

    Empowering End-Users to Manage Business Rules: The Case of a Graphical Environment Built for a Telco

    The authors present GREAT (GRaphical tool for rules Editing and AudiTing), an approach and a tool for graphical business rules management that they designed and developed. This collaborative Web-based application with rich user interface enables easy creation and editing of business rules. Relevant features are the ability to define templates...

    Provided By University of Cincinnati

  • White Papers // May 2011

    Towards Thresholds of Control Flow Complexity Measures for BPMN Models

    Business process models are considered to be a good mechanism for communication among stakeholders and are a key instrument in the analysis and design of information systems. It is therefore important to design business process models with a high level of quality, which can be discovered through measurement application. Several...

    Provided By University of Cincinnati

  • White Papers // Mar 2013

    Ontological Representation and Governance of Business Semantics in Compliant Service Networks

    The Internet would enable new ways for service innovation and trading, as well as for analyzing the resulting value networks, with an unprecedented level of scale and dynamics. Yet most related economic activities remain of a largely brittle and manual nature. Service-oriented business implementations focus on operational aspects at the...

    Provided By University of Cincinnati

  • White Papers // Sep 2011

    A Survey on Data Security in Data Warehousing

    Data Warehouses (DWs) are the enterprise's most valuable assets in what concerns critical business information, making them an appealing target for malicious inside and outside attackers. Given the volume of data and the nature of DW queries, most of the existing data security solutions for databases are inefficient, consuming too...

    Provided By University of Cincinnati

  • White Papers // Sep 2011

    Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing Perspective

    Data Warehouses (DWs) are the core of enterprise sensitive data, which makes protecting confidentiality in DWs a critical task. Published research and best practice guides state that encryption is the best way to achieve this and maintain high performance. However, although encryption algorithms strongly fulfill their security purpose, the authors...

    Provided By University of Cincinnati

  • White Papers // Sep 2011

    Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses

    Data Warehouses (DWs) store the golden nuggets of the business, which makes them an appealing target. To ensure data privacy, encryption solutions have been used and proven efficient in their security purpose. However, they introduce massive storage space and performance overheads, making them unfeasible for DWs. The authors propose a...

    Provided By University of Cincinnati

  • White Papers // Sep 2011

    DBMS Application Layer Intrusion Detection for Data Warehouses

    Data Warehouses (DWs) are used for producing business knowledge and aiding decision support. Since they store the secrets of the business, securing their data is critical. To accomplish this, several Database Intrusion Detection Systems (DIDS) have been proposed. However, when using DIDS in DWs, most solutions either produce too many...

    Provided By University of Cincinnati

  • White Papers // Sep 2011

    Leveraging 24/7 Availability and Performance for Distributed Real-Time Data Warehouses

    Real-time Data Warehouses (DWs) must be able to deal with continuous updates while ensuring 24/7 availability. To improve their performance, distributing data using round-robin algorithms on clusters of shared-nothing machines is normally used. This paper proposes a solution for distributed DW databases that ensures its continuous availability and deals with...

    Provided By University of Cincinnati

  • White Papers // Jan 2012

    Improve Business Interoperability Through Context-Based Ontology Reconciliation

    In collaborative environment, providing flexible interoperation between heterogeneous knowledge-based software applications is critical for efficiency reasons, particularly in the context of unanticipated business collaborations. It is an objective pursued by ongoing research efforts on semantic interoperability: one expects that describing information within ontologies and reconciling these ontologies is sufficient to...

    Provided By University of Cincinnati