University of Gdansk

Displaying 1-10 of 10 results

  • White Papers // Oct 2012

    Self-Stabilizing TDMA Algorithms for Dynamic Wireless Ad-Hoc Networks

    In Dynamic Wireless Ad-hoc Networks (DynWANs), autonomous computing devices set up a network for the communication needs of the moment. These networks require the implementation of a Medium Access Control (MAC) layer. The authors consider MAC protocols for DynWANs that need to be autonomous and robust as well as have...

    Provided By University of Gdansk

  • White Papers // Nov 2011

    Towards Cloud Computing SLA Risk Management: Issues and Challenges

    Cloud computing has become mainstream technology offering metallization of IT infrastructures as services along several paths such as Software (SaaS), Platform (PaaS), and Infrastructure (IaaS). Companies such as Amazon, Microsoft, IBM, and Google, to name but a few, offer such services, which rely on virtualization and pay-as-you-go business models. There...

    Provided By University of Gdansk

  • White Papers // Feb 2011

    Impact of Aspect-Oriented Programming on Software Modularity

    Over a decade ago, Aspect-Oriented Programming (AOP) was proposed in the literature to "Modularize the un-modularizable". Nowadays, the aspect-oriented paradigm pervades all areas of software engineering. With its growing popularity, practitioners are beginning to wonder whether they should start looking into it. However, every new paradigm makes claims that managers...

    Provided By University of Gdansk

  • White Papers // Jan 2011

    Design Patterns With AspectJ, Generics, and Reflective Programming

    Over the past decade, there has been a lot of interest towards Aspect-Oriented Programming (AOP). Hannemann and Kiczales developed AspectJ implementations of the Gang-of-Four (GoF) design patterns. Their study was continued by Hachani, Bardou, Borella, and others. However, no one has tried to improve the implementations by using generics or...

    Provided By University of Gdansk

  • White Papers // Jan 2011

    An Empirical Assessment of the Impact of Aspect-Oriented Programming on Software Modularity

    The term "Crosscutting concern" describes a piece of system that cannot be cleanly modularized because of the limited abstractions offered by the traditional programming paradigms. Symptoms of implementing crosscutting concerns in the languages like C, C# or Java are "Code scattering" and "Code tangling" that both degrade software modularity. Aspect-Oriented...

    Provided By University of Gdansk

  • White Papers // Jan 2011

    What Is Wrong With AOP?

    Modularity is a key concept that programmers wield in their struggle against the complexity of software systems. The implementation of crosscutting concerns in a traditional programming language (e.g. C, C#, Java) results in software that is difficult to maintain and reuse. Although modules have taken many forms over the years...

    Provided By University of Gdansk

  • White Papers // Oct 2008

    Implementing Qos in IP Networks

    With the increasing number of real-time Internet applications, "The best-effort service" has become insufficient to satisfy the needs of end users. The provision of predictable service levels for different types of application in the IP networks has been a subject of active research over the past decade. As a result,...

    Provided By University of Gdansk

  • White Papers // Sep 2008

    The Decorator Pattern Revisited: An Aspect-Oriented Solution

    A critical challenge for software developers is to utilize design experience and reuse existing software when building new systems. Design patterns have proved effective in helping to address these issues. However, the solutions proposed by the literature on design patterns are determined by techniques and language constructs established by Object-Oriented...

    Provided By University of Gdansk

  • White Papers // Oct 2007

    Authentication of Biometric Identification Documents via Mobile Devices

    In this paper, the authors consider the problem of authentication of biometric identification documents via mobile devices such as mobile phones or PDAs. They assume that the biometric identification document holds biometric data (e.g., face or fingerprint) in the form of an image and personal data in the form of...

    Provided By University of Gdansk

  • White Papers // Aug 2006

    Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management

    In this paper, the authors deal with the design of high-rate multilevel Two-Dimensional (2D) bar codes for the print-and-scan channel. They introduce a framework for evaluating the performance limits of these codes by studying an Inter-Symbol Interference (ISI) free, synchronous, and noiseless print-and-scan channel, where the input and output alphabets...

    Provided By University of Gdansk

  • White Papers // Nov 2011

    Towards Cloud Computing SLA Risk Management: Issues and Challenges

    Cloud computing has become mainstream technology offering metallization of IT infrastructures as services along several paths such as Software (SaaS), Platform (PaaS), and Infrastructure (IaaS). Companies such as Amazon, Microsoft, IBM, and Google, to name but a few, offer such services, which rely on virtualization and pay-as-you-go business models. There...

    Provided By University of Gdansk

  • White Papers // Oct 2007

    Authentication of Biometric Identification Documents via Mobile Devices

    In this paper, the authors consider the problem of authentication of biometric identification documents via mobile devices such as mobile phones or PDAs. They assume that the biometric identification document holds biometric data (e.g., face or fingerprint) in the form of an image and personal data in the form of...

    Provided By University of Gdansk

  • White Papers // Aug 2006

    Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management

    In this paper, the authors deal with the design of high-rate multilevel Two-Dimensional (2D) bar codes for the print-and-scan channel. They introduce a framework for evaluating the performance limits of these codes by studying an Inter-Symbol Interference (ISI) free, synchronous, and noiseless print-and-scan channel, where the input and output alphabets...

    Provided By University of Gdansk

  • White Papers // Jan 2011

    Design Patterns With AspectJ, Generics, and Reflective Programming

    Over the past decade, there has been a lot of interest towards Aspect-Oriented Programming (AOP). Hannemann and Kiczales developed AspectJ implementations of the Gang-of-Four (GoF) design patterns. Their study was continued by Hachani, Bardou, Borella, and others. However, no one has tried to improve the implementations by using generics or...

    Provided By University of Gdansk

  • White Papers // Sep 2008

    The Decorator Pattern Revisited: An Aspect-Oriented Solution

    A critical challenge for software developers is to utilize design experience and reuse existing software when building new systems. Design patterns have proved effective in helping to address these issues. However, the solutions proposed by the literature on design patterns are determined by techniques and language constructs established by Object-Oriented...

    Provided By University of Gdansk

  • White Papers // Feb 2011

    Impact of Aspect-Oriented Programming on Software Modularity

    Over a decade ago, Aspect-Oriented Programming (AOP) was proposed in the literature to "Modularize the un-modularizable". Nowadays, the aspect-oriented paradigm pervades all areas of software engineering. With its growing popularity, practitioners are beginning to wonder whether they should start looking into it. However, every new paradigm makes claims that managers...

    Provided By University of Gdansk

  • White Papers // Jan 2011

    An Empirical Assessment of the Impact of Aspect-Oriented Programming on Software Modularity

    The term "Crosscutting concern" describes a piece of system that cannot be cleanly modularized because of the limited abstractions offered by the traditional programming paradigms. Symptoms of implementing crosscutting concerns in the languages like C, C# or Java are "Code scattering" and "Code tangling" that both degrade software modularity. Aspect-Oriented...

    Provided By University of Gdansk

  • White Papers // Jan 2011

    What Is Wrong With AOP?

    Modularity is a key concept that programmers wield in their struggle against the complexity of software systems. The implementation of crosscutting concerns in a traditional programming language (e.g. C, C#, Java) results in software that is difficult to maintain and reuse. Although modules have taken many forms over the years...

    Provided By University of Gdansk

  • White Papers // Oct 2008

    Implementing Qos in IP Networks

    With the increasing number of real-time Internet applications, "The best-effort service" has become insufficient to satisfy the needs of end users. The provision of predictable service levels for different types of application in the IP networks has been a subject of active research over the past decade. As a result,...

    Provided By University of Gdansk

  • White Papers // Oct 2012

    Self-Stabilizing TDMA Algorithms for Dynamic Wireless Ad-Hoc Networks

    In Dynamic Wireless Ad-hoc Networks (DynWANs), autonomous computing devices set up a network for the communication needs of the moment. These networks require the implementation of a Medium Access Control (MAC) layer. The authors consider MAC protocols for DynWANs that need to be autonomous and robust as well as have...

    Provided By University of Gdansk