University of North Florida

Displaying 1-16 of 16 results

  • White Papers // Feb 2014

    Characterizing Workload of Web Applications on Virtualized Servers

    With the ever increasing demands of cloud computing services, planning and management of cloud resources has become a more and more important issue which directed affects the resource utilization and SLA and customer satisfaction. But before any management strategy is made, a good understanding of applications' workload in virtualized environment...

    Provided By University of North Florida

  • White Papers // Dec 2012

    CTrust: A Framework for Secure and Trustworthy Application Execution in Cloud Computing

    Cloud computing is a model that envisions ubiquitous access to a shared pool of configurable resources such as compute, storage, network, and software. Currently e-commerce, on-line auctioning companies, travel agencies and other such services use clouds, primarily because of the elasticity of cloud resources. While cloud computing allows consolidation of...

    Provided By University of North Florida

  • White Papers // Nov 2012

    Cooperative Communication Based on Random Beamforming Strategy in Wireless Sensor Networks

    This paper presents a two-phase cooperative communication strategy and an optimal power allocation strategy to transmit sensor observations to a fusion center in a large-scale sensor network. Outage probability is used to evaluate the performance of the proposed system. Simulation results demonstrate that: when signal-to-noise ratio is low, the performance...

    Provided By University of North Florida

  • White Papers // Aug 2012

    The Chief Security Officer Problem

    This paper presents the Chief Security Officer (CSO) problem, defines its scope, and investigates several important research questions related within the scope. The CSO problem is defined based on the concept of secrecy capacity of wireless communication channels. It is also related to the chief Estimation/Executive Officer (CEO) problem that...

    Provided By University of North Florida

  • White Papers // Jun 2012

    Availability of Services in the Era of Cloud Computing

    One of the most important areas for consumers is security, performance and availability when it comes to cloud computing. Availability refers to the uptime of a system, a network of systems, hardware and software that collectively provide a service during its usage. Traditionally the availability of these has been limited...

    Provided By University of North Florida

  • White Papers // Jun 2012

    Exploring the Convergence of Mobile Computing With Cloud Computing

    The advancements in computing have resulted in a boom of cheap, ubiquitous, connected mobile devices as well as seemingly unlimited, utility style, pay as one go computing resources, commonly referred to as cloud computing. It is desirable to have ubiquitous access to emails and information through mobile computing. More and...

    Provided By University of North Florida

  • White Papers // Mar 2011

    E-Commerce/Network Security Considerations

    E-Commerce security issues can be grouped under the categories of system availability, data integrity, and data privacy. System availability means that all necessary components are available to support a given users transmission requirements. Data integrity means that all valid messages that are sent are received, messages are not altered in...

    Provided By University of North Florida

  • White Papers // Feb 2011

    Cyber-Physical Systems: A Confluence of Cutting Edge Technological Streams

    Cyber-Physical Systems (CPS), the complex closed-loop control system that operates by close coordination of the physical components and computational entities through networked communications, is an emerging technology with great application potential. Advances in networking, sensors, embedded systems, and computer hardware/software/ middleware technologies have enabled research in this area, but still...

    Provided By University of North Florida

  • White Papers // Jan 2011

    Efficiency of SOAP Versus JMS

    Parallel application programmers and software engineers have a variety of paradigms at their disposal. Some of the tools include traditional environments such as Parallel Virtual Machine (PVM) and Message Passing Interface (MPI). Tools that are more modern involve the World Wide Web, including Simple Object Access Protocol (SOAP), Java Messaging...

    Provided By University of North Florida

  • White Papers // Nov 2010

    auto-AID: A Data Mining Framework for Autonomic Anomaly Identification in Networked Computer Systems

    Networked computer systems continue to grow in scale and in the complexity of their components and interactions. Component failures become norms instead of exceptions in these environments. A failure will cause one or multiple computer(s) to be unavailable, which affects the resource utilization and system throughput. When a computer fails...

    Provided By University of North Florida

  • White Papers // Oct 2010

    Are US Companies Employing Standardization Or Adaptation Strategies In Their International Markets?

    Whether to standardize or adapt marketing operations in international markets is the major decision companies marketing their products or services overseas need to make. This decision concerns firms beginning to market in foreign countries and those already operating internationally that are considering expanding into additional markets. Despite significant research on...

    Provided By University of North Florida

  • White Papers // Sep 2010

    Growth By Destination (Where You Export Matters): Trade With China And Growth In African Countries

    The author performs Arellano-Bond GMM estimations using panel data over the period 1995-2008 and explores the growth effects of Africa's trade with China, distinguishing between the effect of imports and the effect of exports, and controlling for the role of export concentration. the results seem to provide support for the...

    Provided By University of North Florida

  • White Papers // Oct 2009

    Channel Coding Design to Support Asynchronous Physical Layer Network Coding

    In this paper, the authors discuss the channel coding design to support the two-phase Physical-Layer Network Coding (PLNC) under a typical three-node network coding scenario. They prove, even two source nodes could use different channel codes, the error correction capability at the relay node is bounded by that of the...

    Provided By University of North Florida

  • White Papers // Feb 2009

    Theoretical Development of a Business Performance Management (BPM)

    The Business Performance Management (BPM) framework helps an organization continuously adjust and successfully execute its strategies. BPM helps increase flexibility by providing managers with a sense of uncertain changes earlier and allows faster response to such changes. It thus helps organizations address market opportunities. The purpose of this paper is...

    Provided By University of North Florida

  • White Papers // Jan 2009

    Microsoft .NET and Security Provided by High -Level Internet Protocols

    This paper describes a class of insecure .NET client applications, which avoid higher layer protocol protection through using a "Raw", send and receive API. The .NET Framework rests on many other Microsoft components, including the Windows Driver Model (WDM). This model supports four driver types, two of which were considered...

    Provided By University of North Florida

  • White Papers // Sep 2008

    Network Risk Management Using Attacker Profiling

    Risk management refers to the process of making decisions that minimize the effects of vulnerabilities on the network hosts. This can be a difficult task in the context of high-exploit probability and the difficult to identify new exploits and vulnerabilities. For many years, security engineers have performed risk analysis using...

    Provided By University of North Florida

  • White Papers // Dec 2012

    CTrust: A Framework for Secure and Trustworthy Application Execution in Cloud Computing

    Cloud computing is a model that envisions ubiquitous access to a shared pool of configurable resources such as compute, storage, network, and software. Currently e-commerce, on-line auctioning companies, travel agencies and other such services use clouds, primarily because of the elasticity of cloud resources. While cloud computing allows consolidation of...

    Provided By University of North Florida

  • White Papers // Nov 2012

    Cooperative Communication Based on Random Beamforming Strategy in Wireless Sensor Networks

    This paper presents a two-phase cooperative communication strategy and an optimal power allocation strategy to transmit sensor observations to a fusion center in a large-scale sensor network. Outage probability is used to evaluate the performance of the proposed system. Simulation results demonstrate that: when signal-to-noise ratio is low, the performance...

    Provided By University of North Florida

  • White Papers // Feb 2011

    Cyber-Physical Systems: A Confluence of Cutting Edge Technological Streams

    Cyber-Physical Systems (CPS), the complex closed-loop control system that operates by close coordination of the physical components and computational entities through networked communications, is an emerging technology with great application potential. Advances in networking, sensors, embedded systems, and computer hardware/software/ middleware technologies have enabled research in this area, but still...

    Provided By University of North Florida

  • White Papers // Oct 2009

    Channel Coding Design to Support Asynchronous Physical Layer Network Coding

    In this paper, the authors discuss the channel coding design to support the two-phase Physical-Layer Network Coding (PLNC) under a typical three-node network coding scenario. They prove, even two source nodes could use different channel codes, the error correction capability at the relay node is bounded by that of the...

    Provided By University of North Florida

  • White Papers // Jan 2009

    Microsoft .NET and Security Provided by High -Level Internet Protocols

    This paper describes a class of insecure .NET client applications, which avoid higher layer protocol protection through using a "Raw", send and receive API. The .NET Framework rests on many other Microsoft components, including the Windows Driver Model (WDM). This model supports four driver types, two of which were considered...

    Provided By University of North Florida

  • White Papers // Oct 2010

    Are US Companies Employing Standardization Or Adaptation Strategies In Their International Markets?

    Whether to standardize or adapt marketing operations in international markets is the major decision companies marketing their products or services overseas need to make. This decision concerns firms beginning to market in foreign countries and those already operating internationally that are considering expanding into additional markets. Despite significant research on...

    Provided By University of North Florida

  • White Papers // Jan 2011

    Efficiency of SOAP Versus JMS

    Parallel application programmers and software engineers have a variety of paradigms at their disposal. Some of the tools include traditional environments such as Parallel Virtual Machine (PVM) and Message Passing Interface (MPI). Tools that are more modern involve the World Wide Web, including Simple Object Access Protocol (SOAP), Java Messaging...

    Provided By University of North Florida

  • White Papers // Sep 2010

    Growth By Destination (Where You Export Matters): Trade With China And Growth In African Countries

    The author performs Arellano-Bond GMM estimations using panel data over the period 1995-2008 and explores the growth effects of Africa's trade with China, distinguishing between the effect of imports and the effect of exports, and controlling for the role of export concentration. the results seem to provide support for the...

    Provided By University of North Florida

  • White Papers // Jun 2012

    Availability of Services in the Era of Cloud Computing

    One of the most important areas for consumers is security, performance and availability when it comes to cloud computing. Availability refers to the uptime of a system, a network of systems, hardware and software that collectively provide a service during its usage. Traditionally the availability of these has been limited...

    Provided By University of North Florida

  • White Papers // Jun 2012

    Exploring the Convergence of Mobile Computing With Cloud Computing

    The advancements in computing have resulted in a boom of cheap, ubiquitous, connected mobile devices as well as seemingly unlimited, utility style, pay as one go computing resources, commonly referred to as cloud computing. It is desirable to have ubiquitous access to emails and information through mobile computing. More and...

    Provided By University of North Florida

  • White Papers // Aug 2012

    The Chief Security Officer Problem

    This paper presents the Chief Security Officer (CSO) problem, defines its scope, and investigates several important research questions related within the scope. The CSO problem is defined based on the concept of secrecy capacity of wireless communication channels. It is also related to the chief Estimation/Executive Officer (CEO) problem that...

    Provided By University of North Florida

  • White Papers // Nov 2010

    auto-AID: A Data Mining Framework for Autonomic Anomaly Identification in Networked Computer Systems

    Networked computer systems continue to grow in scale and in the complexity of their components and interactions. Component failures become norms instead of exceptions in these environments. A failure will cause one or multiple computer(s) to be unavailable, which affects the resource utilization and system throughput. When a computer fails...

    Provided By University of North Florida

  • White Papers // Sep 2008

    Network Risk Management Using Attacker Profiling

    Risk management refers to the process of making decisions that minimize the effects of vulnerabilities on the network hosts. This can be a difficult task in the context of high-exploit probability and the difficult to identify new exploits and vulnerabilities. For many years, security engineers have performed risk analysis using...

    Provided By University of North Florida

  • White Papers // Feb 2014

    Characterizing Workload of Web Applications on Virtualized Servers

    With the ever increasing demands of cloud computing services, planning and management of cloud resources has become a more and more important issue which directed affects the resource utilization and SLA and customer satisfaction. But before any management strategy is made, a good understanding of applications' workload in virtualized environment...

    Provided By University of North Florida

  • White Papers // Feb 2009

    Theoretical Development of a Business Performance Management (BPM)

    The Business Performance Management (BPM) framework helps an organization continuously adjust and successfully execute its strategies. BPM helps increase flexibility by providing managers with a sense of uncertain changes earlier and allows faster response to such changes. It thus helps organizations address market opportunities. The purpose of this paper is...

    Provided By University of North Florida

  • White Papers // Mar 2011

    E-Commerce/Network Security Considerations

    E-Commerce security issues can be grouped under the categories of system availability, data integrity, and data privacy. System availability means that all necessary components are available to support a given users transmission requirements. Data integrity means that all valid messages that are sent are received, messages are not altered in...

    Provided By University of North Florida