University of Karlsruhe

Displaying 1-14 of 14 results

  • White Papers // May 2013

    Warehouse Creator: A Generic Enterprise Solution

    With the advent of 21st century, enterprises developed warehousing solutions and the early solutions were such that multiple warehouses were created within a single enterprise. Though data warehousing has become a benchmark of data integration yet no generic tool cut across type, complexity, enterprise has been proposed as of yet....

    Provided By University of Karlsruhe

  • White Papers // Mar 2013

    Revenue Maximization for Cloud Computing Environment through Resource Sharing by SLA

    Cloud computing is receiving a great demand among the budding and old enterprises depending on various Information Technology Services in the present IT Scenario. Cloud provides various services which mostly depend upon a good decision making process to handle various requests from service consumers. The Cloud users are mostly divided...

    Provided By University of Karlsruhe

  • White Papers // Oct 2012

    Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework

    Evaluating the security of software systems is a complex problem for the research communities due to the multifaceted and complex operational environment of the system involved. Many efforts towards the secure system development methodologies like secSDLC by Microsoft have been made but the measurement scale on which the security can...

    Provided By University of Karlsruhe

  • White Papers // Aug 2012

    Intrusion Detection and Prevention System: Classification and Quick Review

    Besides the growth of information technology, the security has remained a main challenging issue for organizations. Most of the organizations are facing an increasing number of threats every day in the form of viruses and attack etc. Since many different mechanisms were opted by organizations in the form of intrusion...

    Provided By University of Karlsruhe

  • White Papers // Jan 2012

    Business Intelligence: An Integrated Approach

    Business intelligence systems combine operational and historical data with analytical tools to present valuable and competitive information to business planners and decision makers. The objective of Business Intelligence (BI) is to improve the timeliness and Business intelligence applications and technologies can help companies to analyze changing trends in market share;...

    Provided By University of Karlsruhe

  • White Papers // May 2011

    Effectiveness and Limitations of E-Mail Security Protocols

    Simple mail transport protocol is the most widely adopted protocol for e-mail delivery. However, it lacks security features for privacy, authentication of sending party, integrity of e-mail message, non-repudiation and consistency of e-mail envelope. To make e-mail communication secure and private, e-mail servers incorporate one or more security features using...

    Provided By University of Karlsruhe

  • White Papers // Jun 2010

    A Disaster Aid Sensor Network Using ZigBee for Patient Localization and Air Temperature Monitoring

    The mass casualty emergency response involves logistic impediments like overflowing victims, paper triaging, extended victim wait time and transport. The authors propose a new system based on a location aware wireless sensor network to overcome these impediments and assist the Emergency Responders (ER) to improve emergency response during disasters. In...

    Provided By University of Karlsruhe

  • White Papers // Jun 2010

    Dynamic Frames in Java Dynamic Logic

    This paper presents a realisation of the concept of dynamic frames in a dynamic logic for verifying Java programs. This is achieved by treating sets of heap locations as first class citizens in the logic. Syntax and formal semantics of the logic are presented, along with sound proof rules for...

    Provided By University of Karlsruhe

  • White Papers // Jan 2010

    Semantic Methods and Tools for Information Portals

    The paper describes a set of approaches for representing and accessing information within a semantically structured information portal, while offering the possibility to integrate own information. It discusses research performed within the project Semantic Methods and Tools for Information Portals (SemIPort). In particular, it focuses on the development of scalable...

    Provided By University of Karlsruhe

  • White Papers // Jan 2010

    Corridor Routing in Mobile Ad-Hoc Networks

    A new reactive strategy for multi-path routing in mobile ad-hoc networks is presented. Given a pair of communicating stations, the authors use the complete set of minimal-length paths - a so-called corridor - between the two. The potentially high number of paths within a corridor is efficiently installed by virtue...

    Provided By University of Karlsruhe

  • White Papers // Jul 2009

    Device Driver Reuse Via Virtual Machines

    Device drivers constitute a significant portion of an operating system's source code. The effort to develop a new driver set is a sobering hurdle to the pursuit of novel operating system ventures. A practical solution is to reuse drivers, but this can contradict design goals in a new operating system....

    Provided By University of Karlsruhe

  • White Papers // Jul 2009

    Federated and Service-Oriented Identity Management at a University

    Federation is a way to ease the establishment. This definition of a federation, which has been established in this paper, suits well for universities. This is because universities also consist of quasi-independent units. This leads to the need for integrating data for the various constituents of a university. This necessitates...

    Provided By University of Karlsruhe

  • White Papers // Apr 2009

    Identity Management in Business Process Modelling: A Model-Driven Approach

    The internet, the ongoing globalization, and resulting needs for faster communication and interaction with business partners. The modeling of business processes is widely used in enterprises. Requirements for identity management and access control are often collected separately in documents or requirement tools. Due to the business-driven background of access control,...

    Provided By University of Karlsruhe

  • White Papers // Jan 2009

    About the Return on Investment of Test-Driven Development

    Test-driven development is one of the central techniques of Extreme Programming. However, the impact of test-driven development on the business value of a project has not been studied so far. The paper presents an economic model for the return on investment when using test-driven development instead of the conventional development...

    Provided By University of Karlsruhe

  • White Papers // May 2011

    Effectiveness and Limitations of E-Mail Security Protocols

    Simple mail transport protocol is the most widely adopted protocol for e-mail delivery. However, it lacks security features for privacy, authentication of sending party, integrity of e-mail message, non-repudiation and consistency of e-mail envelope. To make e-mail communication secure and private, e-mail servers incorporate one or more security features using...

    Provided By University of Karlsruhe

  • White Papers // Mar 2013

    Revenue Maximization for Cloud Computing Environment through Resource Sharing by SLA

    Cloud computing is receiving a great demand among the budding and old enterprises depending on various Information Technology Services in the present IT Scenario. Cloud provides various services which mostly depend upon a good decision making process to handle various requests from service consumers. The Cloud users are mostly divided...

    Provided By University of Karlsruhe

  • White Papers // Jan 2012

    Business Intelligence: An Integrated Approach

    Business intelligence systems combine operational and historical data with analytical tools to present valuable and competitive information to business planners and decision makers. The objective of Business Intelligence (BI) is to improve the timeliness and Business intelligence applications and technologies can help companies to analyze changing trends in market share;...

    Provided By University of Karlsruhe

  • White Papers // Jan 2009

    About the Return on Investment of Test-Driven Development

    Test-driven development is one of the central techniques of Extreme Programming. However, the impact of test-driven development on the business value of a project has not been studied so far. The paper presents an economic model for the return on investment when using test-driven development instead of the conventional development...

    Provided By University of Karlsruhe

  • White Papers // Apr 2009

    Identity Management in Business Process Modelling: A Model-Driven Approach

    The internet, the ongoing globalization, and resulting needs for faster communication and interaction with business partners. The modeling of business processes is widely used in enterprises. Requirements for identity management and access control are often collected separately in documents or requirement tools. Due to the business-driven background of access control,...

    Provided By University of Karlsruhe

  • White Papers // Jul 2009

    Federated and Service-Oriented Identity Management at a University

    Federation is a way to ease the establishment. This definition of a federation, which has been established in this paper, suits well for universities. This is because universities also consist of quasi-independent units. This leads to the need for integrating data for the various constituents of a university. This necessitates...

    Provided By University of Karlsruhe

  • White Papers // Jun 2010

    Dynamic Frames in Java Dynamic Logic

    This paper presents a realisation of the concept of dynamic frames in a dynamic logic for verifying Java programs. This is achieved by treating sets of heap locations as first class citizens in the logic. Syntax and formal semantics of the logic are presented, along with sound proof rules for...

    Provided By University of Karlsruhe

  • White Papers // Jan 2010

    Semantic Methods and Tools for Information Portals

    The paper describes a set of approaches for representing and accessing information within a semantically structured information portal, while offering the possibility to integrate own information. It discusses research performed within the project Semantic Methods and Tools for Information Portals (SemIPort). In particular, it focuses on the development of scalable...

    Provided By University of Karlsruhe

  • White Papers // Jan 2010

    Corridor Routing in Mobile Ad-Hoc Networks

    A new reactive strategy for multi-path routing in mobile ad-hoc networks is presented. Given a pair of communicating stations, the authors use the complete set of minimal-length paths - a so-called corridor - between the two. The potentially high number of paths within a corridor is efficiently installed by virtue...

    Provided By University of Karlsruhe

  • White Papers // Jul 2009

    Device Driver Reuse Via Virtual Machines

    Device drivers constitute a significant portion of an operating system's source code. The effort to develop a new driver set is a sobering hurdle to the pursuit of novel operating system ventures. A practical solution is to reuse drivers, but this can contradict design goals in a new operating system....

    Provided By University of Karlsruhe

  • White Papers // Jun 2010

    A Disaster Aid Sensor Network Using ZigBee for Patient Localization and Air Temperature Monitoring

    The mass casualty emergency response involves logistic impediments like overflowing victims, paper triaging, extended victim wait time and transport. The authors propose a new system based on a location aware wireless sensor network to overcome these impediments and assist the Emergency Responders (ER) to improve emergency response during disasters. In...

    Provided By University of Karlsruhe

  • White Papers // Aug 2012

    Intrusion Detection and Prevention System: Classification and Quick Review

    Besides the growth of information technology, the security has remained a main challenging issue for organizations. Most of the organizations are facing an increasing number of threats every day in the form of viruses and attack etc. Since many different mechanisms were opted by organizations in the form of intrusion...

    Provided By University of Karlsruhe

  • White Papers // May 2013

    Warehouse Creator: A Generic Enterprise Solution

    With the advent of 21st century, enterprises developed warehousing solutions and the early solutions were such that multiple warehouses were created within a single enterprise. Though data warehousing has become a benchmark of data integration yet no generic tool cut across type, complexity, enterprise has been proposed as of yet....

    Provided By University of Karlsruhe

  • White Papers // Oct 2012

    Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework

    Evaluating the security of software systems is a complex problem for the research communities due to the multifaceted and complex operational environment of the system involved. Many efforts towards the secure system development methodologies like secSDLC by Microsoft have been made but the measurement scale on which the security can...

    Provided By University of Karlsruhe