University of New Orleans Fund

Displaying 1-40 of 47 results

  • White Papers // Oct 2013

    FlaRe: Efficient Capability Semantics for Timely Processor Access

    In the seL4 microkernel and other capability-based OSs, the right to use resources is managed using abstract capabilities. Capability systems for fungible resources such as memory are well understood, but it has proven difficult to integrate time - i.e., real-time scheduling - into this model, since timeliness (i.e., system-wide schedulability)...

    Provided By University of New Orleans Fund

  • White Papers // Jul 2013

    Physical Layer Security in Downlink Multi-Antenna Cellular Networks

    In this paper, the authors study physical layer security for the downlink of cellular networks, where the confidential messages transmitted to each mobile user can be eavesdropped by both the other users in the same cell and the users in the other cells. The locations of base stations and mobile...

    Provided By University of New Orleans Fund

  • White Papers // Jun 2013

    A New Method to Mitigate the Impacts of Economical Denial of Sustainability Attacks Against the Cloud

    In the cloud era, security has become a renewed source of concerns. Distributed Denial of Service (DDoS) and the Economical Denial of Sustainability (EDoS) that can affect the pay-per-use model, which is one of the most valuable benefits of the cloud, can again become very relevant especially with the introduction...

    Provided By University of New Orleans Fund

  • White Papers // May 2013

    Managing the IT Integration of Acquisitions by Multi-Business Organizations

    Acquisitions are standard components of the growth strategies of many organizations. Frequently, acquisitions raise important questions concerning how and to what extent the acquisition's Information Technology (IT) needs to be integrated into the IT of the acquirer. The authors investigate how the initial conditions of business and IT alignment in...

    Provided By University of New Orleans Fund

  • White Papers // May 2013

    Patterned Interactions in Complex Systems: The Role of Information Technology for Reshaping Organizational Structures

    The complex relationships between organizational practices have been the focus of Information Technology Business Value (ITBV) research in recent years. There appears to be a discernible trend toward a more nuanced view in which the effects of Information Technology (IT), various organizational practices and their complex interactions are systematically investigated....

    Provided By University of New Orleans Fund

  • White Papers // May 2013

    Technoidentology: Towards an Explication of Individual Relationships With IS/IT

    This paper argues that IS theories should not ignore or background the relationship between individuals and technologies in explaining concepts such as adoption, innovation, diffusion, and practice. The relationships that individuals have with technologies should, arguably, be a core interest of IS because of the centrality of people and IT...

    Provided By University of New Orleans Fund

  • White Papers // Apr 2013

    Attacks Via Record Multiplicity on Cancelable Biometrics Templates

    Various template protection techniques have been developed in the past few years, among which cancelable biometrics is a very popular and efficient one. It uses a noninvertible transformation to map an original template to a transformed domain to prevent the recovery of the original template from a compromised transformed template....

    Provided By University of New Orleans Fund

  • White Papers // Dec 2012

    Formal Verification, Engineering and Business Value

    How to apply automated verification technology such as model checking and static program analysis to millions of lines of embedded C/C++ code? How to package this technology in a way that it can be used by software developers and engineers, who might have no background in formal verification? And how...

    Provided By University of New Orleans Fund

  • White Papers // Nov 2012

    Verifying Probabilistic Correctness in Isabelle with pGCL

    This paper presents a formalization of pGCL in Isabelle/HOL. Using a shallow embedding, the authors demonstrate close integration with existing automation support. They demonstrate the facility with which the model can be extended to incorporate existing results, including those of the L4.verified project. They motivate the applicability of the formalism...

    Provided By University of New Orleans Fund

  • White Papers // Nov 2012

    Automatic Verification of Message-Based Device Drivers

    The authors develop a practical solution to the problem of automatic verification of the interface between device drivers and the OS. Their solution relies on a combination of improved driver architecture and verification tools. It supports drivers written in C and can be implemented in any existing OS, which sets...

    Provided By University of New Orleans Fund

  • White Papers // Oct 2012

    Assimilation of the Cloud: Benefits and Challenges to Acceptance, Routinization and Infusion of Cloud Computing

    This paper goes beyond a binary view of adoption and instead examines the more complex nature of cloud computing assimilation. It examines acceptance, the extent to which an organization's members are committed to the adoption, routinization, the extent to which the use of cloud becomes a normal activity, and infusion,...

    Provided By University of New Orleans Fund

  • White Papers // Oct 2012

    A Performance Model of Pedestrian Dead Reckoning With Activity-Based Location Updates

    Advanced computing and sensing capabilities of smartphones provide new opportunities for personal indoor positioning. A particular trend is to employ human activity recognition for autonomous calibration of pedestrian dead reckoning systems thereby achieving accurate indoor positioning even in the absence of any positioning infrastructure. The basic idea is that the...

    Provided By University of New Orleans Fund

  • White Papers // Sep 2012

    Bringing Viability to Service-Oriented Enterprises in Cloud Ecosystems

    Cloud Computing is the next evolution of computing systems, which shifts the whole application infrastructure away from old monolithic architectural models to more open, interoperable, modular, reusable and agile building blocks. Many Enterprises realize the benefits of Cloud Computing and position it as the Information Technology (IT) outsourcing solution, which...

    Provided By University of New Orleans Fund

  • White Papers // Sep 2012

    Automatic Undo for Cloud Management via AI Planning

    The facility to rollback a collection of changes, i.e., reverting to a previous acceptable state, a checkpoint, is widely recognized as valuable support for dependability. This paper considers the particular needs of users of cloud computing resources, wishing to manage the resources. Cloud computing provides infrastructure programmatically managed through a...

    Provided By University of New Orleans Fund

  • White Papers // Jul 2012

    Application of Business-Driven Decision Making to RESTful Business Processes

    Runtime adaptability is a desired quality attribute in business processes, particularly cross-organizational ones. Past work showed that designing and implementing business processes following the REpresentational State Transfer (REST) principles increases runtime adaptability. However, the past solutions for RESTful Business Processes (RESTfulBP) were limited to manual selection of process fragments to...

    Provided By University of New Orleans Fund

  • White Papers // Jul 2012

    To Preempt or Not to Preempt, That Is the Question

    Real-Time Operating Systems (RTOSes) are traditionally designed to be fully preemptible. This improves the average interrupt response time of the system but increases kernel complexity. An alternative design is to make the kernel mostly non-preemptible and only handle pending interrupts at specific preemption points within the kernel. While this potentially...

    Provided By University of New Orleans Fund

  • White Papers // Jun 2012

    A Business Process-Driven Approach for Requirements Dependency Analysis

    Dependencies among software artifacts are very useful for various software development and maintenance activities such as change impact analysis and effort estimation. In the past, the focus on artifact dependencies has been at the design and code level rather than at the requirements level. This is due to the difficulties...

    Provided By University of New Orleans Fund

  • White Papers // Jun 2012

    Programming Cloud Resource Orchestration Framework: Operations and Research Challenges

    The emergence of cloud computing over the past five years is potentially one of the breakthrough advances in the history of computing. It delivers hardware and software resources as virtualization enabled services and in which administrators are free from the burden of worrying about the low level implementation or system...

    Provided By University of New Orleans Fund

  • White Papers // May 2012

    Relay Assisted Spectrum Sharing in Cognitive Radio Networks

    In this paper, the authors propose a Relay Assisted Spectrum Sharing (RASS) scheme based on the mixed sharing strategy in cognitive radio networks. Mixed sharing is a more general sharing strategy which provides a higher spectrum utilization efficiency than underlay sharing and interweave sharing. Compared to conventional mixed sharing, the...

    Provided By University of New Orleans Fund

  • White Papers // May 2012

    Optimal Spectrum Sensing Over Multipath Channels

    Wireless propagation phenomena including multipath pose significant challenges to reliable spectrum sensing which is a fundamental requirement for dynamic spectrum access and system coexistence. In this paper, an optimal detection technique along with two reduced-complexity alternatives, Modified Energy Detection (MED) and Equal Gain Detection (EGD), are proposed to improve the...

    Provided By University of New Orleans Fund

  • White Papers // May 2012

    Asymmetric Interference Alignment and Cancelation for 3-User MIMO Interference Channels

    The notion of Degree of Freedom (DoF) of a communication network, also known as the capacity pre-log/multiplexing gain/effective-bandwidth, etc., is a fundamental concept in communication and information theory. With recent focus on capacity approximation, the DoF characterization becomes especially significant as it provides a capacity approximation whose accuracy approaches 100%...

    Provided By University of New Orleans Fund

  • White Papers // May 2012

    Heterogeneous Secure Multi-Party Computation

    The increased processing power and storage capacity of in-home and mobile computing devices has motivated their inclusion in distributed and cloud computing systems. The resulting diverse environment creates a strong requirement for secure computations, which can be realized by secure Multi-Party Computation (MPC). However, MPC most commonly assumes that parties...

    Provided By University of New Orleans Fund

  • White Papers // Mar 2012

    Large System Analysis of the Secrecy Sum-Rates With Regularized Channel Inversion Precoding

    Wireless networks are used more and more often to exchange sensitive data. Due to the broadcast nature of the medium, every node in the network is a potential eavesdropper, and securing the transmitted information is critical. Traditionally, security is ensured by network-layer cryptography techniques. These techniques are potentially vulnerable, since...

    Provided By University of New Orleans Fund

  • White Papers // Sep 2011

    Support for the Business Motivation Model in the WS-Policy4MASC Language and MiniZnMASC Middleware

    The WS-Policy4MASC language and MiniZnMASC middleware for policy-driven management of service-oriented systems enable making IT system management decisions that maximize diverse business value metrics (e.g., profit, customer satisfaction). However, their past support for alignment with high-level business considerations was weak. Therefore, the authors introduce a new extension of WS-Policy4MASC that...

    Provided By University of New Orleans Fund

  • White Papers // Jul 2011

    BPModelMasher: Manage Your Process Variants Effectively

    Now-a-days, modern organizations build large repositories of process models to describe and document their daily business operations. One reason for the large number of process models is the need to adapt with different business contexts, i.e. process variants. Automated maintenance of the consistency between process variants is an important goal...

    Provided By University of New Orleans Fund

  • White Papers // Jun 2011

    An Investigation of 'Build Vs. Buy' Decision for Software Acquisition by Small to Medium Enterprises

    The prevalence of computing and communication technologies, combined with real-time transactions, and sophisticated and highly specialized software packages have made package acquisition a viable option for many of today's enterprises. At the same time, innovative and flexible outsourcing methods as well as increasing ease of use of open sources have...

    Provided By University of New Orleans Fund

  • White Papers // Jun 2011

    A Query Language for Analyzing Business Processes Execution

    The execution of a Business Process (BP) in today's enterprises may involve a work flow and multiple IT systems and services. Often no complete, up-to-date documentation of the model or correlation information of process events exist. Understanding the execution of a BP in terms of its scope and details is...

    Provided By University of New Orleans Fund

  • White Papers // Apr 2011

    An Architecture Framework for Application-Managed Scaling of Cloud-Hosted Relational Databases

    Scaling relational database in the cloud is one of the critical factors in the migration of applications to the cloud. It is important that applications can directly monitor fine-grained scaling performance (such as consistency-related replication delays and query-specific response time) and specify application-specific policies for autonomic management of the scaling....

    Provided By University of New Orleans Fund

  • White Papers // Mar 2011

    Using SOA Governance Design Methodologies to Augment Enterprise Service Descriptions

    In large-scale SOA development projects, organizations utilize enterprise services to implement new composite applications. Such enterprise services are commonly developed based on service design methodologies of a SOA Governance process to feasibly deal with a large set of enterprise services. However, this usually reduces their understand ability and affects the...

    Provided By University of New Orleans Fund

  • White Papers // Dec 2010

    Interband Mutual Information in Blind Audio Bandwidth Extension

    Bandwidth extension schemes have received considerable research attention for their ability to perceptually enhance band-limited audio. However, existing schemes do not exploit mutual information between bands or saliency of spectral features. A novel blind scheme is proposed, which preserves harmonicity in the extended spectrum and employs a trained band energy...

    Provided By University of New Orleans Fund

  • White Papers // Dec 2010

    A Survey of Large Scale Data Management Approaches in Cloud Environments

    In the last two decades, the continuous increase of computational power has produced an overwhelming flow of data. Moreover, the recent advances in Web technology has made it easy for any user to provide and consume content of any form. This has called for a paradigm shift in the computing...

    Provided By University of New Orleans Fund

  • White Papers // Nov 2010

    Facilitating Enterprise Service Discovery for Non-Technical Business Users

    Enterprise Services (ES) are Web services with which enterprise applications expose a subset of their functionality. Due to the often high number of different ES, as well as the complex nature of their names, it is difficult for non-technical business users to discover services in ES repositories. However, most of...

    Provided By University of New Orleans Fund

  • White Papers // Jul 2010

    Design of Rate-compatible Protograph-based LDPC Codes with Mixed Circulants

    Low-Density Parity-Check (LDPC) codes were initially proposed by Gallager in early 1960s. Their excellent performance with iterative decoding over various channels is overshadowed by the complexity of encoding and decoding. The authors propose a novel design of rate-compatible protograph-based low-density parity-check code families that can cover a wide range of...

    Provided By University of New Orleans Fund

  • White Papers // Jun 2010

    Evaluating Cloud Platform Architecture with the CARE Framework

    There is an emergence of cloud application platforms such as Microsoft's azure, Google's app engine and Amazon's EC2/SimpleDB/S3. Startups and enterprise alike, lured by the promise of 'Infinite Scalability', 'Ease of Development', 'Low Infrastructure Setup Cost' are increasingly using these cloud service building blocks to develop and deploy their web...

    Provided By University of New Orleans Fund

  • White Papers // Feb 2010

    An Analysis of Patents from the Business- Driven IT Management Research Community

    Many important (particularly industry) solutions to research problems are included in patents, but not in academic publications. The authors studied patents invented by researchers associated with the annual IEEE/IFIP Business-Driven IT Management (BDIM) workshops and selected for in-depth analysis 4 granted patents and 19 pending patent applications most closely related...

    Provided By University of New Orleans Fund

  • White Papers // Dec 2009

    Relational Processing of RDF Queries: A Survey

    The Resource Description Framework (RDF) is a flexible model for representing information about resources in the web. With the increasing amount of RDF data which is becoming available, efficient and scalable management of RDF data has become a fundamental challenge to achieve the Semantic Web vision. The RDF model has...

    Provided By University of New Orleans Fund

  • White Papers // Apr 2009

    vNUMA: A Virtual Shared-Memory Multiprocessor

    Shared-Memory Multiprocessor (SMM) systems provide a simple programming model compatible with a large base of existing applications and operating systems. They naturally lend themselves to providing a Single System Image (SSI) running a single Operating-System (OS) instance with a single resource name space. vNUMA, for virtual NUMA, is a virtual...

    Provided By University of New Orleans Fund

  • White Papers // Feb 2009

    Standardization as a Business Ecosystem Enabler

    As service-oriented computing enables businesses to expose their functions more widely, a business ecosystem forms around the exposed services. This paper reports research-in-progress that considers standardization as an enabler in business ecosystems. Based on issues encountered, the authors propose that: business model design is also critical for standards bodies; standards...

    Provided By University of New Orleans Fund

  • White Papers // Dec 2008

    Beyond Soundness: On the Verification of Semantic Business Process Models

    The verification of control-flow soundness is well understood as an important step before deploying business process models. However, the control flow does not capture what the process activities actually do when they are executed. Semantic annotations offer the opportunity to take this into account. Inspired by semantic Web service approaches...

    Provided By University of New Orleans Fund

  • White Papers // Oct 2008

    Managing Supply Chain Risks in Multi-Site, Multi-Partner Engineering Projects

    Identification and managing of variety of risks during the complete product design, development and delivery process are challenging. It covers the 'Product value stream' in engineering projects including partners, suppliers, research and development, design and manufacturing, marketing, purchasing, service and support personnel and customers. This, coupled with the relationships that...

    Provided By University of New Orleans Fund

  • White Papers // Dec 2008

    Beyond Soundness: On the Verification of Semantic Business Process Models

    The verification of control-flow soundness is well understood as an important step before deploying business process models. However, the control flow does not capture what the process activities actually do when they are executed. Semantic annotations offer the opportunity to take this into account. Inspired by semantic Web service approaches...

    Provided By University of New Orleans Fund

  • White Papers // Jun 2013

    A New Method to Mitigate the Impacts of Economical Denial of Sustainability Attacks Against the Cloud

    In the cloud era, security has become a renewed source of concerns. Distributed Denial of Service (DDoS) and the Economical Denial of Sustainability (EDoS) that can affect the pay-per-use model, which is one of the most valuable benefits of the cloud, can again become very relevant especially with the introduction...

    Provided By University of New Orleans Fund

  • White Papers // Oct 2008

    Managing Supply Chain Risks in Multi-Site, Multi-Partner Engineering Projects

    Identification and managing of variety of risks during the complete product design, development and delivery process are challenging. It covers the 'Product value stream' in engineering projects including partners, suppliers, research and development, design and manufacturing, marketing, purchasing, service and support personnel and customers. This, coupled with the relationships that...

    Provided By University of New Orleans Fund

  • White Papers // Jun 2011

    An Investigation of 'Build Vs. Buy' Decision for Software Acquisition by Small to Medium Enterprises

    The prevalence of computing and communication technologies, combined with real-time transactions, and sophisticated and highly specialized software packages have made package acquisition a viable option for many of today's enterprises. At the same time, innovative and flexible outsourcing methods as well as increasing ease of use of open sources have...

    Provided By University of New Orleans Fund

  • White Papers // Sep 2012

    Bringing Viability to Service-Oriented Enterprises in Cloud Ecosystems

    Cloud Computing is the next evolution of computing systems, which shifts the whole application infrastructure away from old monolithic architectural models to more open, interoperable, modular, reusable and agile building blocks. Many Enterprises realize the benefits of Cloud Computing and position it as the Information Technology (IT) outsourcing solution, which...

    Provided By University of New Orleans Fund

  • White Papers // May 2006

    Contract Driven Cross-Organizational Business Processes

    Managing the processes of autonomous business organizations while they collaborate is a key requirement in order to guarantee that every business partner sees benefits of the collaboration. Thanks to the advances in the middleware IT technologies, some of the most important limitations of cross-organizational collaborations have been resolved. Yet, there...

    Provided By University of New Orleans Fund

  • White Papers // Mar 2007

    A Conceptual Framework for Composition in Business Process Management

    In this paper, the authors present a conceptual framework for deriving executable business process models from high-level, graphical business process models based on the paradigm of Service-Oriented Architectures and Semantic Web technology. They hereby envision a direct, but implicit link from a business analyst's view on a process model to...

    Provided By University of New Orleans Fund

  • White Papers // May 2007

    Requirements for Implementing Business Process Models Through Composition of Semantic Web Services

    Despite significant research efforts, automated service composition is neither taken up broadly nor can it be considered a solved problem. The authors believe that this is partly the case due to an unclear formulation of the actual business requirements and frame for this technology. In this paper, they formulate a...

    Provided By University of New Orleans Fund

  • White Papers // Nov 2010

    Facilitating Enterprise Service Discovery for Non-Technical Business Users

    Enterprise Services (ES) are Web services with which enterprise applications expose a subset of their functionality. Due to the often high number of different ES, as well as the complex nature of their names, it is difficult for non-technical business users to discover services in ES repositories. However, most of...

    Provided By University of New Orleans Fund

  • White Papers // Mar 2011

    Using SOA Governance Design Methodologies to Augment Enterprise Service Descriptions

    In large-scale SOA development projects, organizations utilize enterprise services to implement new composite applications. Such enterprise services are commonly developed based on service design methodologies of a SOA Governance process to feasibly deal with a large set of enterprise services. However, this usually reduces their understand ability and affects the...

    Provided By University of New Orleans Fund

  • White Papers // Jul 2011

    BPModelMasher: Manage Your Process Variants Effectively

    Now-a-days, modern organizations build large repositories of process models to describe and document their daily business operations. One reason for the large number of process models is the need to adapt with different business contexts, i.e. process variants. Automated maintenance of the consistency between process variants is an important goal...

    Provided By University of New Orleans Fund

  • White Papers // Apr 2006

    Formal Consistency Verification Between BPEL Process and Privacy Policy

    Despite the increased privacy concerns in the Internet, not much attention has been paid into enforcing privacy policies of organizations that collect and consume personal data using automatic means (e.g., Web services). In this paper, the authors propose a graph-transformation based framework to check whether an internal business process (implemented...

    Provided By University of New Orleans Fund

  • White Papers // Sep 2006

    A Service-Oriented Architecture for Financial Business Processes

    Recent years have witnessed a tremendous growth in information and communication technologies that facilitate the design and implementation of complex inter-enterprise business processes. One of the major innovations is the concept of service-oriented architectures which considers software systems as being made up with autonomous, dynamic, loosely coupled and service-based components....

    Provided By University of New Orleans Fund

  • White Papers // Sep 2011

    Support for the Business Motivation Model in the WS-Policy4MASC Language and MiniZnMASC Middleware

    The WS-Policy4MASC language and MiniZnMASC middleware for policy-driven management of service-oriented systems enable making IT system management decisions that maximize diverse business value metrics (e.g., profit, customer satisfaction). However, their past support for alignment with high-level business considerations was weak. Therefore, the authors introduce a new extension of WS-Policy4MASC that...

    Provided By University of New Orleans Fund

  • White Papers // Jul 2012

    Application of Business-Driven Decision Making to RESTful Business Processes

    Runtime adaptability is a desired quality attribute in business processes, particularly cross-organizational ones. Past work showed that designing and implementing business processes following the REpresentational State Transfer (REST) principles increases runtime adaptability. However, the past solutions for RESTful Business Processes (RESTfulBP) were limited to manual selection of process fragments to...

    Provided By University of New Orleans Fund

  • White Papers // Feb 2010

    An Analysis of Patents from the Business- Driven IT Management Research Community

    Many important (particularly industry) solutions to research problems are included in patents, but not in academic publications. The authors studied patents invented by researchers associated with the annual IEEE/IFIP Business-Driven IT Management (BDIM) workshops and selected for in-depth analysis 4 granted patents and 19 pending patent applications most closely related...

    Provided By University of New Orleans Fund

  • White Papers // Jun 2012

    A Business Process-Driven Approach for Requirements Dependency Analysis

    Dependencies among software artifacts are very useful for various software development and maintenance activities such as change impact analysis and effort estimation. In the past, the focus on artifact dependencies has been at the design and code level rather than at the requirements level. This is due to the difficulties...

    Provided By University of New Orleans Fund

  • White Papers // Dec 2012

    Formal Verification, Engineering and Business Value

    How to apply automated verification technology such as model checking and static program analysis to millions of lines of embedded C/C++ code? How to package this technology in a way that it can be used by software developers and engineers, who might have no background in formal verification? And how...

    Provided By University of New Orleans Fund

  • White Papers // Feb 2009

    Standardization as a Business Ecosystem Enabler

    As service-oriented computing enables businesses to expose their functions more widely, a business ecosystem forms around the exposed services. This paper reports research-in-progress that considers standardization as an enabler in business ecosystems. Based on issues encountered, the authors propose that: business model design is also critical for standards bodies; standards...

    Provided By University of New Orleans Fund

  • White Papers // Jun 2011

    A Query Language for Analyzing Business Processes Execution

    The execution of a Business Process (BP) in today's enterprises may involve a work flow and multiple IT systems and services. Often no complete, up-to-date documentation of the model or correlation information of process events exist. Understanding the execution of a BP in terms of its scope and details is...

    Provided By University of New Orleans Fund

  • White Papers // Sep 2012

    Automatic Undo for Cloud Management via AI Planning

    The facility to rollback a collection of changes, i.e., reverting to a previous acceptable state, a checkpoint, is widely recognized as valuable support for dependability. This paper considers the particular needs of users of cloud computing resources, wishing to manage the resources. Cloud computing provides infrastructure programmatically managed through a...

    Provided By University of New Orleans Fund

  • White Papers // Jul 2012

    To Preempt or Not to Preempt, That Is the Question

    Real-Time Operating Systems (RTOSes) are traditionally designed to be fully preemptible. This improves the average interrupt response time of the system but increases kernel complexity. An alternative design is to make the kernel mostly non-preemptible and only handle pending interrupts at specific preemption points within the kernel. While this potentially...

    Provided By University of New Orleans Fund

  • White Papers // Dec 2010

    Interband Mutual Information in Blind Audio Bandwidth Extension

    Bandwidth extension schemes have received considerable research attention for their ability to perceptually enhance band-limited audio. However, existing schemes do not exploit mutual information between bands or saliency of spectral features. A novel blind scheme is proposed, which preserves harmonicity in the extended spectrum and employs a trained band energy...

    Provided By University of New Orleans Fund

  • White Papers // Oct 2012

    A Performance Model of Pedestrian Dead Reckoning With Activity-Based Location Updates

    Advanced computing and sensing capabilities of smartphones provide new opportunities for personal indoor positioning. A particular trend is to employ human activity recognition for autonomous calibration of pedestrian dead reckoning systems thereby achieving accurate indoor positioning even in the absence of any positioning infrastructure. The basic idea is that the...

    Provided By University of New Orleans Fund

  • White Papers // Jul 2010

    Design of Rate-compatible Protograph-based LDPC Codes with Mixed Circulants

    Low-Density Parity-Check (LDPC) codes were initially proposed by Gallager in early 1960s. Their excellent performance with iterative decoding over various channels is overshadowed by the complexity of encoding and decoding. The authors propose a novel design of rate-compatible protograph-based low-density parity-check code families that can cover a wide range of...

    Provided By University of New Orleans Fund

  • White Papers // Oct 2012

    Assimilation of the Cloud: Benefits and Challenges to Acceptance, Routinization and Infusion of Cloud Computing

    This paper goes beyond a binary view of adoption and instead examines the more complex nature of cloud computing assimilation. It examines acceptance, the extent to which an organization's members are committed to the adoption, routinization, the extent to which the use of cloud becomes a normal activity, and infusion,...

    Provided By University of New Orleans Fund

  • White Papers // May 2013

    Patterned Interactions in Complex Systems: The Role of Information Technology for Reshaping Organizational Structures

    The complex relationships between organizational practices have been the focus of Information Technology Business Value (ITBV) research in recent years. There appears to be a discernible trend toward a more nuanced view in which the effects of Information Technology (IT), various organizational practices and their complex interactions are systematically investigated....

    Provided By University of New Orleans Fund

  • White Papers // May 2013

    Technoidentology: Towards an Explication of Individual Relationships With IS/IT

    This paper argues that IS theories should not ignore or background the relationship between individuals and technologies in explaining concepts such as adoption, innovation, diffusion, and practice. The relationships that individuals have with technologies should, arguably, be a core interest of IS because of the centrality of people and IT...

    Provided By University of New Orleans Fund

  • White Papers // May 2013

    Managing the IT Integration of Acquisitions by Multi-Business Organizations

    Acquisitions are standard components of the growth strategies of many organizations. Frequently, acquisitions raise important questions concerning how and to what extent the acquisition's Information Technology (IT) needs to be integrated into the IT of the acquirer. The authors investigate how the initial conditions of business and IT alignment in...

    Provided By University of New Orleans Fund

  • White Papers // Oct 2013

    FlaRe: Efficient Capability Semantics for Timely Processor Access

    In the seL4 microkernel and other capability-based OSs, the right to use resources is managed using abstract capabilities. Capability systems for fungible resources such as memory are well understood, but it has proven difficult to integrate time - i.e., real-time scheduling - into this model, since timeliness (i.e., system-wide schedulability)...

    Provided By University of New Orleans Fund

  • White Papers // May 2012

    Relay Assisted Spectrum Sharing in Cognitive Radio Networks

    In this paper, the authors propose a Relay Assisted Spectrum Sharing (RASS) scheme based on the mixed sharing strategy in cognitive radio networks. Mixed sharing is a more general sharing strategy which provides a higher spectrum utilization efficiency than underlay sharing and interweave sharing. Compared to conventional mixed sharing, the...

    Provided By University of New Orleans Fund

  • White Papers // May 2012

    Optimal Spectrum Sensing Over Multipath Channels

    Wireless propagation phenomena including multipath pose significant challenges to reliable spectrum sensing which is a fundamental requirement for dynamic spectrum access and system coexistence. In this paper, an optimal detection technique along with two reduced-complexity alternatives, Modified Energy Detection (MED) and Equal Gain Detection (EGD), are proposed to improve the...

    Provided By University of New Orleans Fund

  • White Papers // May 2012

    Asymmetric Interference Alignment and Cancelation for 3-User MIMO Interference Channels

    The notion of Degree of Freedom (DoF) of a communication network, also known as the capacity pre-log/multiplexing gain/effective-bandwidth, etc., is a fundamental concept in communication and information theory. With recent focus on capacity approximation, the DoF characterization becomes especially significant as it provides a capacity approximation whose accuracy approaches 100%...

    Provided By University of New Orleans Fund

  • White Papers // Mar 2012

    Large System Analysis of the Secrecy Sum-Rates With Regularized Channel Inversion Precoding

    Wireless networks are used more and more often to exchange sensitive data. Due to the broadcast nature of the medium, every node in the network is a potential eavesdropper, and securing the transmitted information is critical. Traditionally, security is ensured by network-layer cryptography techniques. These techniques are potentially vulnerable, since...

    Provided By University of New Orleans Fund

  • White Papers // Jun 2012

    Programming Cloud Resource Orchestration Framework: Operations and Research Challenges

    The emergence of cloud computing over the past five years is potentially one of the breakthrough advances in the history of computing. It delivers hardware and software resources as virtualization enabled services and in which administrators are free from the burden of worrying about the low level implementation or system...

    Provided By University of New Orleans Fund

  • White Papers // Nov 2012

    Verifying Probabilistic Correctness in Isabelle with pGCL

    This paper presents a formalization of pGCL in Isabelle/HOL. Using a shallow embedding, the authors demonstrate close integration with existing automation support. They demonstrate the facility with which the model can be extended to incorporate existing results, including those of the L4.verified project. They motivate the applicability of the formalism...

    Provided By University of New Orleans Fund

  • White Papers // Nov 2012

    Automatic Verification of Message-Based Device Drivers

    The authors develop a practical solution to the problem of automatic verification of the interface between device drivers and the OS. Their solution relies on a combination of improved driver architecture and verification tools. It supports drivers written in C and can be implemented in any existing OS, which sets...

    Provided By University of New Orleans Fund

  • White Papers // Sep 2008

    Resource-Oriented Architecture for Business Processes

    REpresentational State Transfer (REST) is the set of design principles behind the World Wide Web (WWW). REST treats all entities in the world as link connected resources, and supports a Resource-Oriented Architecture (ROA) for the design of applications. REST and ROA are responsible for many of the desirable quality attributes...

    Provided By University of New Orleans Fund

  • White Papers // Apr 2013

    Attacks Via Record Multiplicity on Cancelable Biometrics Templates

    Various template protection techniques have been developed in the past few years, among which cancelable biometrics is a very popular and efficient one. It uses a noninvertible transformation to map an original template to a transformed domain to prevent the recovery of the original template from a compromised transformed template....

    Provided By University of New Orleans Fund

  • White Papers // Dec 2010

    A Survey of Large Scale Data Management Approaches in Cloud Environments

    In the last two decades, the continuous increase of computational power has produced an overwhelming flow of data. Moreover, the recent advances in Web technology has made it easy for any user to provide and consume content of any form. This has called for a paradigm shift in the computing...

    Provided By University of New Orleans Fund