University of Dubuque

Displaying 1-23 of 23 results

  • White Papers // Oct 2013

    Enterprise Models as Drivers for IT Security Management at Runtime

    In this paper, the authors describe how enterprise models can be made suitable for monitoring and controlling IT security at runtime. A holistic modeling method is proposed that extends enterprise models with runtime information, turning them into dashboards for managing security incidents and risks, and supporting decision making at runtime....

    Provided By University of Dubuque

  • White Papers // Jun 2013

    Security of Public Continuous Integration Services

    Continuous Integration (CI) and Free, Libre and Open Source Software (FLOSS) are both associated with agile software development. Contradictingly, FLOSS projects have difficulties to use CI and software forges still lack support for CI. Two factors hamper widespread use of CI in FLOSS development: Cost of the computational resources and...

    Provided By University of Dubuque

  • White Papers // May 2013

    Exploiting IS/IT Projects' Potential - Towards a Design Theory for Benefits Management

    Despite organizations' substantial investments in Information Systems and Information Technology (IS/IT), the successful realization of appropriate benefits is still often considered a major organizational challenge. Benefits Management (BM) aims at resolving this issue and has become increasingly popular in recent years. Although several papers have been published in this domain,...

    Provided By University of Dubuque

  • White Papers // May 2013

    Understanding IT Governance Success and Its Impact: Results From an Interview Study

    Owing to the increasing regulatory pressure and the need for aligned IT decisions, governance of IT has become important for both academia and practice. However, knowledge that integrates the determinants and consequences of IT governance success remains scarce. Although some studies investigate single aspects of IT governance success and its...

    Provided By University of Dubuque

  • White Papers // May 2013

    Agile Behavior of Business Intelligence Systems: An Empirical Study on the Impact of Inmemory Technology

    To achieve strategic advantage in increasingly turbulent environments, it is vital for organizations to draw faster conclusions out of changing circumstances. As most decisions today are based on data collected by Information Systems, the IS itself must become more adaptable. This is particularly challenging in the domain of Business Intelligence...

    Provided By University of Dubuque

  • White Papers // Mar 2013

    When Cellular Meets WiFi in Wireless Small Cell Networks

    The deployment of Small Cell Base Stations (SCBSs) overlaid on existing macro-cellular systems is seen as a key solution for offloading traffic, optimizing coverage, and boosting the capacity of future cellular wireless systems. The next-generation of SCBSs is envisioned to be multi-mode, i.e., capable of transmitting simultaneously on both licensed...

    Provided By University of Dubuque

  • White Papers // Jan 2013

    Union Renewal and Business Strategies: Strategic Codetermination of Works Councils and the Campaign \"Better Not Cheaper\" of the German Metalworkers' Union

    The trade union campaign \"Better not cheaper\" of the German metalworkers' union IG Metall is one of the most famous attempts of union revitalization in Germany and at the same time a new approach of unions to influence business strategies. Focusing on the activation of works councils, the aim of...

    Provided By University of Dubuque

  • White Papers // Jan 2013

    Comparison of Business Processes and Agile Software Development Processes

    The comparison of agile software development processes and the classical primary business processes using their central aspects shows the similarity of the software development process and the classical product development process. Thus the software development process is one of the primary business processes of software development organizations. Although software development...

    Provided By University of Dubuque

  • White Papers // Nov 2012

    Dynamic Inter-Cell Interference Coordination in HetNets: A Reinforcement Learning Approach

    In this paper, the authors investigate enhanced Inter-Cell Interference Coordination (e-ICIC) techniques for Heterogeneous Networks (HetNets), consisting of a mix of macro and picocells. They model this strategic coexistence as a multi-agent system in which decentralized interference management and cell association strategies inspired from Reinforcement Learning (RL) are devised. Specifically,...

    Provided By University of Dubuque

  • White Papers // Jun 2012

    Interference Estimation for Multi-Layer MU-MIMO Transmission in LTE-Advanced Systems

    The aim of this paper is to get an insight of the interference estimation for Multi-Layer Multi-User Multiple-Input and Multiple-Output (ML-MU-MIMO) transmission for LTE-Advanced (Long Term Evolution) systems. Different interference-aware receivers have been investigated in ML-MU-MIMO with the presence of co-layer, intra-cell and inter-cell interferences. User-spEcific Reference Signal (UE-RS) based...

    Provided By University of Dubuque

  • White Papers // May 2012

    Applying Trust and Reputation Mechanisms to a Kademlia-Based Distributed Hash Table

    Trust and reputation management in Peer-To-Peer (P2P) networks is a current topic. Most of the works focus on unstructured networks. The existing work operating in structured networks concentrates on a "Clean routing table" and aims to keep malicious nodes from it. The authors follow a different approach which they call...

    Provided By University of Dubuque

  • White Papers // May 2012

    On the Fairness of Transport Protocols in a Multi-Path Environment

    Today, a steadily growing number of devices contains multiple network interfaces. For example, nearly all Smartphones are equipped with at least W-LAN as well as 3G/4G interfaces. In consequence, there is a rising demand for so-called multi-path transfer, which utilizes all of these interfaces simultaneously in order to maximize the...

    Provided By University of Dubuque

  • White Papers // May 2012

    An Aspect-Oriented Approach to Relating Security Requirements and Access Control

    Affecting multiple parts in software systems, security requirements often tangle with functional requirements. In order to separate crosscutting concerns and increase modularity, the authors propose to represent security requirements as aspects that can be woven into functional requirements. Using problem frames to model the functional requirements, weaving is achieved by...

    Provided By University of Dubuque

  • White Papers // Feb 2012

    Patterns-And Security-Requirements-Engineering-Based Support for Development and Documentation of Security Standard Compliant ICT Systems

    Security is a system property of ICT systems and an acceptable security level has to be achieved for the entire system. Aligning an ICT system with a security standard is a challenging task, because of the sparse support for development and documentation that these standards provide. The authors create patterns...

    Provided By University of Dubuque

  • White Papers // Jan 2012

    Analysis of CQI Prediction for MU-MIMO in LTE Systems

    The aim of this paper is to get an insight of Multi-User Multiple-Input and Multiple-Output (MU-MIMO) Channel Quality Indicator (CQI) prediction for Long Term Evolution (LTE) systems. MU-MIMO CQI predictions have been investigated for LTE Release 8 (rank one, Transmission Mode 5) and for LTE Release 9 (adaptive rank, Transmission...

    Provided By University of Dubuque

  • White Papers // Sep 2011

    Receiver Performance-Complexity Tradeoff in LTE MU-MIMO Transmission

    Multi-User Multiple-Input and Multiple-Output (MU-MIMO) transmission scheme provides potential gain in terms of system capacity in spatial correlated scenarios and is considered as one of the key technologies in Long Term Evolution (LTE) systems. The goal of this paper is to gain insight into MU-MIMO detection concepts and their implementation...

    Provided By University of Dubuque

  • White Papers // May 2011

    A Domain Specific Model to Support Model Driven Development of Business Logic

    Despite of ongoing development of model-driven development approaches in industry and academia, the authors believe that there is a lack of support for the generation of business logic code from refined process models. In their paper, they developed a framework to support a consistent support of modeling and generation of...

    Provided By University of Dubuque

  • White Papers // Sep 2010

    Browser-based Analysis of Web Framework Applications

    Although web applications evolved to mature solutions providing sophisticated user experience, they also became complex for the same reason. Complexity primarily affects the server-side generation of dynamic pages as they are aggregated from multiple sources and as there are lots of possible processing paths depending on parameters. Browser-based tests are...

    Provided By University of Dubuque

  • White Papers // Oct 2009

    How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns

    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address security and privacy issues. However, understanding why and when...

    Provided By University of Dubuque

  • White Papers // Oct 2009

    ITML: A Domain-Specific Modeling Language for Supporting Business Driven IT Management

    Management of today's IT is a challenging task that requires a profound understanding of both the IT landscape and the relevant business context. Numerous relations and dependencies between business and IT exist, which have to be accounted for, e.g., for better IT/business alignment. This paper presents ITML (IT domain specific...

    Provided By University of Dubuque

  • White Papers // Sep 2009

    Designing and Utilising Business Indicator Systems within Enterprise Models - Outline of a Method

    The design of effective indicators and indicator systems requires a profound understanding of the relevant business context. Numerous relations and dependencies within an indicator system exist, which need to be analyzed thoroughly: many relations are based on implicit assumptions or sometimes not known by the management at all. This is...

    Provided By University of Dubuque

  • White Papers // May 2008

    Employee Competencies for Business Process Management

    Business Process Management (BPM) is an approach which empowers companies to react flexibly to new market situations. The main goal of BPM is to improve efficiency and effectiveness of value-adding business processes. The changes caused by globalization do not only concern organization, technologies and processes, but also people. Employee competencies...

    Provided By University of Dubuque

  • White Papers // Jun 2007

    Secure End-to-End Transport Over SCTP

    The stream control transmission protocol is a new transport protocol initially developed to transport signaling messages over IP networks. The new features of SCTP make it also a suitable candidate for applications which nowadays use the standard transport protocols TCP and UDP. Many of these applications have strict requirements with...

    Provided By University of Dubuque

  • White Papers // May 2013

    Exploiting IS/IT Projects' Potential - Towards a Design Theory for Benefits Management

    Despite organizations' substantial investments in Information Systems and Information Technology (IS/IT), the successful realization of appropriate benefits is still often considered a major organizational challenge. Benefits Management (BM) aims at resolving this issue and has become increasingly popular in recent years. Although several papers have been published in this domain,...

    Provided By University of Dubuque

  • White Papers // May 2012

    Applying Trust and Reputation Mechanisms to a Kademlia-Based Distributed Hash Table

    Trust and reputation management in Peer-To-Peer (P2P) networks is a current topic. Most of the works focus on unstructured networks. The existing work operating in structured networks concentrates on a "Clean routing table" and aims to keep malicious nodes from it. The authors follow a different approach which they call...

    Provided By University of Dubuque

  • White Papers // May 2012

    On the Fairness of Transport Protocols in a Multi-Path Environment

    Today, a steadily growing number of devices contains multiple network interfaces. For example, nearly all Smartphones are equipped with at least W-LAN as well as 3G/4G interfaces. In consequence, there is a rising demand for so-called multi-path transfer, which utilizes all of these interfaces simultaneously in order to maximize the...

    Provided By University of Dubuque

  • White Papers // Jan 2012

    Analysis of CQI Prediction for MU-MIMO in LTE Systems

    The aim of this paper is to get an insight of Multi-User Multiple-Input and Multiple-Output (MU-MIMO) Channel Quality Indicator (CQI) prediction for Long Term Evolution (LTE) systems. MU-MIMO CQI predictions have been investigated for LTE Release 8 (rank one, Transmission Mode 5) and for LTE Release 9 (adaptive rank, Transmission...

    Provided By University of Dubuque

  • White Papers // Jun 2012

    Interference Estimation for Multi-Layer MU-MIMO Transmission in LTE-Advanced Systems

    The aim of this paper is to get an insight of the interference estimation for Multi-Layer Multi-User Multiple-Input and Multiple-Output (ML-MU-MIMO) transmission for LTE-Advanced (Long Term Evolution) systems. Different interference-aware receivers have been investigated in ML-MU-MIMO with the presence of co-layer, intra-cell and inter-cell interferences. User-spEcific Reference Signal (UE-RS) based...

    Provided By University of Dubuque

  • White Papers // Sep 2011

    Receiver Performance-Complexity Tradeoff in LTE MU-MIMO Transmission

    Multi-User Multiple-Input and Multiple-Output (MU-MIMO) transmission scheme provides potential gain in terms of system capacity in spatial correlated scenarios and is considered as one of the key technologies in Long Term Evolution (LTE) systems. The goal of this paper is to gain insight into MU-MIMO detection concepts and their implementation...

    Provided By University of Dubuque

  • White Papers // Nov 2012

    Dynamic Inter-Cell Interference Coordination in HetNets: A Reinforcement Learning Approach

    In this paper, the authors investigate enhanced Inter-Cell Interference Coordination (e-ICIC) techniques for Heterogeneous Networks (HetNets), consisting of a mix of macro and picocells. They model this strategic coexistence as a multi-agent system in which decentralized interference management and cell association strategies inspired from Reinforcement Learning (RL) are devised. Specifically,...

    Provided By University of Dubuque

  • White Papers // Sep 2010

    Browser-based Analysis of Web Framework Applications

    Although web applications evolved to mature solutions providing sophisticated user experience, they also became complex for the same reason. Complexity primarily affects the server-side generation of dynamic pages as they are aggregated from multiple sources and as there are lots of possible processing paths depending on parameters. Browser-based tests are...

    Provided By University of Dubuque

  • White Papers // Mar 2013

    When Cellular Meets WiFi in Wireless Small Cell Networks

    The deployment of Small Cell Base Stations (SCBSs) overlaid on existing macro-cellular systems is seen as a key solution for offloading traffic, optimizing coverage, and boosting the capacity of future cellular wireless systems. The next-generation of SCBSs is envisioned to be multi-mode, i.e., capable of transmitting simultaneously on both licensed...

    Provided By University of Dubuque

  • White Papers // May 2013

    Understanding IT Governance Success and Its Impact: Results From an Interview Study

    Owing to the increasing regulatory pressure and the need for aligned IT decisions, governance of IT has become important for both academia and practice. However, knowledge that integrates the determinants and consequences of IT governance success remains scarce. Although some studies investigate single aspects of IT governance success and its...

    Provided By University of Dubuque

  • White Papers // May 2013

    Agile Behavior of Business Intelligence Systems: An Empirical Study on the Impact of Inmemory Technology

    To achieve strategic advantage in increasingly turbulent environments, it is vital for organizations to draw faster conclusions out of changing circumstances. As most decisions today are based on data collected by Information Systems, the IS itself must become more adaptable. This is particularly challenging in the domain of Business Intelligence...

    Provided By University of Dubuque

  • White Papers // Jun 2007

    Secure End-to-End Transport Over SCTP

    The stream control transmission protocol is a new transport protocol initially developed to transport signaling messages over IP networks. The new features of SCTP make it also a suitable candidate for applications which nowadays use the standard transport protocols TCP and UDP. Many of these applications have strict requirements with...

    Provided By University of Dubuque

  • White Papers // May 2012

    An Aspect-Oriented Approach to Relating Security Requirements and Access Control

    Affecting multiple parts in software systems, security requirements often tangle with functional requirements. In order to separate crosscutting concerns and increase modularity, the authors propose to represent security requirements as aspects that can be woven into functional requirements. Using problem frames to model the functional requirements, weaving is achieved by...

    Provided By University of Dubuque

  • White Papers // Feb 2012

    Patterns-And Security-Requirements-Engineering-Based Support for Development and Documentation of Security Standard Compliant ICT Systems

    Security is a system property of ICT systems and an acceptable security level has to be achieved for the entire system. Aligning an ICT system with a security standard is a challenging task, because of the sparse support for development and documentation that these standards provide. The authors create patterns...

    Provided By University of Dubuque

  • White Papers // Oct 2013

    Enterprise Models as Drivers for IT Security Management at Runtime

    In this paper, the authors describe how enterprise models can be made suitable for monitoring and controlling IT security at runtime. A holistic modeling method is proposed that extends enterprise models with runtime information, turning them into dashboards for managing security incidents and risks, and supporting decision making at runtime....

    Provided By University of Dubuque

  • White Papers // Jun 2013

    Security of Public Continuous Integration Services

    Continuous Integration (CI) and Free, Libre and Open Source Software (FLOSS) are both associated with agile software development. Contradictingly, FLOSS projects have difficulties to use CI and software forges still lack support for CI. Two factors hamper widespread use of CI in FLOSS development: Cost of the computational resources and...

    Provided By University of Dubuque

  • White Papers // Oct 2009

    How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns

    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address security and privacy issues. However, understanding why and when...

    Provided By University of Dubuque

  • White Papers // Oct 2009

    ITML: A Domain-Specific Modeling Language for Supporting Business Driven IT Management

    Management of today's IT is a challenging task that requires a profound understanding of both the IT landscape and the relevant business context. Numerous relations and dependencies between business and IT exist, which have to be accounted for, e.g., for better IT/business alignment. This paper presents ITML (IT domain specific...

    Provided By University of Dubuque

  • White Papers // May 2011

    A Domain Specific Model to Support Model Driven Development of Business Logic

    Despite of ongoing development of model-driven development approaches in industry and academia, the authors believe that there is a lack of support for the generation of business logic code from refined process models. In their paper, they developed a framework to support a consistent support of modeling and generation of...

    Provided By University of Dubuque

  • White Papers // Jan 2013

    Comparison of Business Processes and Agile Software Development Processes

    The comparison of agile software development processes and the classical primary business processes using their central aspects shows the similarity of the software development process and the classical product development process. Thus the software development process is one of the primary business processes of software development organizations. Although software development...

    Provided By University of Dubuque

  • White Papers // May 2008

    Employee Competencies for Business Process Management

    Business Process Management (BPM) is an approach which empowers companies to react flexibly to new market situations. The main goal of BPM is to improve efficiency and effectiveness of value-adding business processes. The changes caused by globalization do not only concern organization, technologies and processes, but also people. Employee competencies...

    Provided By University of Dubuque

  • White Papers // Jan 2013

    Union Renewal and Business Strategies: Strategic Codetermination of Works Councils and the Campaign \"Better Not Cheaper\" of the German Metalworkers' Union

    The trade union campaign \"Better not cheaper\" of the German metalworkers' union IG Metall is one of the most famous attempts of union revitalization in Germany and at the same time a new approach of unions to influence business strategies. Focusing on the activation of works councils, the aim of...

    Provided By University of Dubuque

  • White Papers // Sep 2009

    Designing and Utilising Business Indicator Systems within Enterprise Models - Outline of a Method

    The design of effective indicators and indicator systems requires a profound understanding of the relevant business context. Numerous relations and dependencies within an indicator system exist, which need to be analyzed thoroughly: many relations are based on implicit assumptions or sometimes not known by the management at all. This is...

    Provided By University of Dubuque