University of Namur

Displaying 1-13 of 13 results

  • White Papers // Jun 2013

    MOSAIC-Based Intrusion Detection Framework for Cloud Computing

    In recent years, with the growing popularity of cloud computing, security in cloud has become an important issue. Cloud computing paradigm represents an opportunity for users to reduce costs and increase efficiency providing an alternative way of using services. It represents both a technology for using computing infrastructures in a...

    Provided By University of Namur

  • White Papers // Jun 2013

    A Cloud Agency for SLA Negotiation and Management

    The cloud represents a computing utility targeted to a market of consumers who require specific quality of services to be maintained by their providers. In this context a resource management based on service level agreements is needed in order to negotiate a collection of inter-connected and virtualized computers between resource...

    Provided By University of Namur

  • White Papers // May 2012

    Using Feature Modelling and Automations to Select Among Cloud Solutions

    Cloud computing is a major trend in distributed computing environments. Resources are accessed on demand by customers and are delivered as services by cloud providers in a pay-per-use model. Companies provide their applications as services and rely on cloud providers to provision, host and manage such applications on top of...

    Provided By University of Namur

  • White Papers // Jan 2012

    Gain Design and Power Allocation for Overloaded MIMO-OFDM Systems With Channel State Information and Iterative Multiuser Detection

    This paper deals with multiuser MIMO-OFDM systems in which single-antenna users transmit encoded data to a common receiver employing iterative multiuser detection. The authors focus on uplink communications in overloaded scenarios, i.e. the feasibility for the system to support a number of users larger than the number of receives antennas....

    Provided By University of Namur

  • White Papers // Oct 2011

    Cloud Application Monitoring: The MOSAIC Approach

    Cloud computing delegates the management of any kind of resources, such as the computing environment or storage systems for example, to the network. The wide-spread permeation of the cloud paradigm implies the need of new programming models that are able to utilize such new features. Once the problem of enabling...

    Provided By University of Namur

  • White Papers // Jun 2011

    Treemap-Based Burst Mapping Algorithm for Downlink Mobile WiMAX Systems

    This paper presents the authors' sqTM burst mapping algorithm for downlink Mobile WiMAX systems. Based on a treemap visualization algorithm, they introduce a new burst mapping scheme they called sqTM, greatly reducing the amount of wasted slots. They obtained between 60% and 75% reduction compared to some reference algorithms they...

    Provided By University of Namur

  • White Papers // Sep 2010

    Adaptive Expectations, Confirmatory Bias, And Informational Efficiency

    The authors study the informational efficiency of a market with a single traded asset. The price initially differs from the fundamental value, about which the agents have noisy private information (which is, on average, correct). A fraction of traders revise their price expectations in each period. The price at which...

    Provided By University of Namur

  • White Papers // Sep 2010

    CAODV: Routing in Mobile Ad-Hoc Cognitive Radio Networks

    This paper deals with the routing in cognitive mobile ad hoc networks. The authors propose to modify the widely adopted Ad-hoc On-demand Distance Vector (AODV) protocol in order to assure its functionality in the considered scenario. The resulting protocol, referred to as the Cognitive Ad-hoc On-demand Distance Vector (CAODV) protocol,...

    Provided By University of Namur

  • White Papers // Sep 2010

    B2B Supply Chain Performance Enhancement Road Map Using Data Mining Techniques

    This paper has described the integrated application between B2B Supply Chain (B2B-SC) performance evaluation systems and data mining techniques, developing relationship rules of the collaborative performance attribute enhancement road map. After the proposed methodology implementation, the result is extended to the B2B-SC improvement road map guidelines to promote the right...

    Provided By University of Namur

  • White Papers // Dec 2009

    Cloud Agency: A Mobile Agent Based Cloud System

    The cloud paradigm appeared on the computing scene in 2005 with the Amazon Elastic Compute Cloud (EC2). After this date, a large set of related technologies has been developed. In the academic world, and especially in the HPC area, cloud computing is in some way in competition with the GRID...

    Provided By University of Namur

  • White Papers // Jul 2009

    A Theoretical Model for Opportunistic Routing in Ad Hoc Networks

    Traditional routing strategies for multi-hop wireless networks forward packets by selecting at the sender side the next hop for each packet. Recently, such a paradigm has been called into question by a new approach, namely the Opportunistic Routing. It exploits the broadcast nature of wireless transmissions to take advantage from...

    Provided By University of Namur

  • White Papers // Feb 2009

    Towards a Theory of Requirements Elicitation: Acceptability Condition for the Relative Validity of Requirements

    A requirements engineering artifact is valid relative to the stakeholders of the system-to-be if they agree on the content of that artifact. Checking relative validity involves a discussion between the stakeholders and the requirements engineer. This paper proposes a language for the representation of information exchanged in a discussion about...

    Provided By University of Namur

  • White Papers // Sep 2008

    Towards a Measurement Framework for Security Risk Management

    Risk management is currently a key tool for managing Information System (IS) security. In the context of the definition of an IS Security Risk Management (ISSRM) modelling language, the authors have already defined the set of concepts and relationships taking a place in the ISSRM domain within a UML class...

    Provided By University of Namur

  • White Papers // Feb 2009

    Towards a Theory of Requirements Elicitation: Acceptability Condition for the Relative Validity of Requirements

    A requirements engineering artifact is valid relative to the stakeholders of the system-to-be if they agree on the content of that artifact. Checking relative validity involves a discussion between the stakeholders and the requirements engineer. This paper proposes a language for the representation of information exchanged in a discussion about...

    Provided By University of Namur

  • White Papers // Sep 2010

    Adaptive Expectations, Confirmatory Bias, And Informational Efficiency

    The authors study the informational efficiency of a market with a single traded asset. The price initially differs from the fundamental value, about which the agents have noisy private information (which is, on average, correct). A fraction of traders revise their price expectations in each period. The price at which...

    Provided By University of Namur

  • White Papers // Jun 2011

    Treemap-Based Burst Mapping Algorithm for Downlink Mobile WiMAX Systems

    This paper presents the authors' sqTM burst mapping algorithm for downlink Mobile WiMAX systems. Based on a treemap visualization algorithm, they introduce a new burst mapping scheme they called sqTM, greatly reducing the amount of wasted slots. They obtained between 60% and 75% reduction compared to some reference algorithms they...

    Provided By University of Namur

  • White Papers // May 2012

    Using Feature Modelling and Automations to Select Among Cloud Solutions

    Cloud computing is a major trend in distributed computing environments. Resources are accessed on demand by customers and are delivered as services by cloud providers in a pay-per-use model. Companies provide their applications as services and rely on cloud providers to provision, host and manage such applications on top of...

    Provided By University of Namur

  • White Papers // Sep 2010

    CAODV: Routing in Mobile Ad-Hoc Cognitive Radio Networks

    This paper deals with the routing in cognitive mobile ad hoc networks. The authors propose to modify the widely adopted Ad-hoc On-demand Distance Vector (AODV) protocol in order to assure its functionality in the considered scenario. The resulting protocol, referred to as the Cognitive Ad-hoc On-demand Distance Vector (CAODV) protocol,...

    Provided By University of Namur

  • White Papers // Jul 2009

    A Theoretical Model for Opportunistic Routing in Ad Hoc Networks

    Traditional routing strategies for multi-hop wireless networks forward packets by selecting at the sender side the next hop for each packet. Recently, such a paradigm has been called into question by a new approach, namely the Opportunistic Routing. It exploits the broadcast nature of wireless transmissions to take advantage from...

    Provided By University of Namur

  • White Papers // Jan 2012

    Gain Design and Power Allocation for Overloaded MIMO-OFDM Systems With Channel State Information and Iterative Multiuser Detection

    This paper deals with multiuser MIMO-OFDM systems in which single-antenna users transmit encoded data to a common receiver employing iterative multiuser detection. The authors focus on uplink communications in overloaded scenarios, i.e. the feasibility for the system to support a number of users larger than the number of receives antennas....

    Provided By University of Namur

  • White Papers // Sep 2010

    B2B Supply Chain Performance Enhancement Road Map Using Data Mining Techniques

    This paper has described the integrated application between B2B Supply Chain (B2B-SC) performance evaluation systems and data mining techniques, developing relationship rules of the collaborative performance attribute enhancement road map. After the proposed methodology implementation, the result is extended to the B2B-SC improvement road map guidelines to promote the right...

    Provided By University of Namur

  • White Papers // Dec 2009

    Cloud Agency: A Mobile Agent Based Cloud System

    The cloud paradigm appeared on the computing scene in 2005 with the Amazon Elastic Compute Cloud (EC2). After this date, a large set of related technologies has been developed. In the academic world, and especially in the HPC area, cloud computing is in some way in competition with the GRID...

    Provided By University of Namur

  • White Papers // Jun 2013

    MOSAIC-Based Intrusion Detection Framework for Cloud Computing

    In recent years, with the growing popularity of cloud computing, security in cloud has become an important issue. Cloud computing paradigm represents an opportunity for users to reduce costs and increase efficiency providing an alternative way of using services. It represents both a technology for using computing infrastructures in a...

    Provided By University of Namur

  • White Papers // Oct 2011

    Cloud Application Monitoring: The MOSAIC Approach

    Cloud computing delegates the management of any kind of resources, such as the computing environment or storage systems for example, to the network. The wide-spread permeation of the cloud paradigm implies the need of new programming models that are able to utilize such new features. Once the problem of enabling...

    Provided By University of Namur

  • White Papers // Jun 2013

    A Cloud Agency for SLA Negotiation and Management

    The cloud represents a computing utility targeted to a market of consumers who require specific quality of services to be maintained by their providers. In this context a resource management based on service level agreements is needed in order to negotiate a collection of inter-connected and virtualized computers between resource...

    Provided By University of Namur

  • White Papers // Sep 2008

    Towards a Measurement Framework for Security Risk Management

    Risk management is currently a key tool for managing Information System (IS) security. In the context of the definition of an IS Security Risk Management (ISSRM) modelling language, the authors have already defined the set of concepts and relationships taking a place in the ISSRM domain within a UML class...

    Provided By University of Namur