University of Orleans

Displaying 1-40 of 59 results

  • White Papers // Jun 2014

    Analysis of SR ARQ Delays Using Data-bundling over Markov Channels

    Data-bundling is a useful technique that decreases the delivery delay of packet streams when they are transmitted over noisy channels and are subject to retransmission-based error control. In this paper, the authors investigate the packet delay statistics for a fully reliable Selective Repeat Automatic Repeat reQuest (SR ARQ) where a...

    Provided By University of Orleans

  • White Papers // Sep 2013

    Is today's public cloud suited to deploy hardcore realtime services? A CPU perspective

    Cloud computing is a popular way for application providers to obtain a flexible server and network infrastructure. Providers deploying applications with tight response time requirements such as games, are reluctant to use clouds. An important reason is the lack of real-time guarantees. This paper evaluates the actual, practical soft real-time...

    Provided By University of Orleans

  • White Papers // Sep 2013

    Bounds: Expressing Reservations about Incoming Data

    This paper introduces the Boundz vocabulary, an RDF vocabulary for expressing reservations about incoming data. The authors argue that the need for such a vocabulary is real and pressing, and that it is a useful validation tool for any recipient of RDF data that wishes to formulate restrictions on amendments...

    Provided By University of Orleans

  • White Papers // Jun 2013

    The OffPAD: Requirements and Usage

    Strong authentication for online service access typically requires some kind of hardware device for generating dynamic access credentials that are often used in combination with static passwords. This practice has the side effect that users fill up their pockets with more and more devices and their heads with more and...

    Provided By University of Orleans

  • White Papers // May 2013

    Entity Authentication & Trust Validation in PKI Using Petname Systems

    Recognition of identities and certainty about identity ownership are crucial factors for secure communication in digital environments. Identity management systems have been designed to aid users as well as organizations to manage different user identities. However, traditional identity management systems are primarily designed to facilitate the management of identities from...

    Provided By University of Orleans

  • White Papers // May 2013

    PKI Trust Models

    A PKI can be described as a set of technologies, procedures and policies for propagating trust from where it initially exists to where it is needed for authentication in online environments. How the trust propagation takes place under a specific PKI depends on the PKI's syntactic trust structure which is...

    Provided By University of Orleans

  • White Papers // Apr 2013

    Extended HTTP Digest Access Authentication

    User authentication to a server is typically done by presenting a username and a password in some protected form to the server, and having the server verify that those credentials correspond to an identity previously registered and authorized for access. It is crucial that attackers never get access to operational...

    Provided By University of Orleans

  • White Papers // Jan 2013

    Trust Extortion on the Internet

    Dangers exist on the internet in the sense that there are attackers who try to break into the users? Computer or who in other ways try to trick them when they engage in online activities. In order to steer away from such dangers people tend to look for signals of...

    Provided By University of Orleans

  • White Papers // Jan 2013

    The Essential Dynamics of Information Infrastructures

    This paper inquires into the complexities of contemporary IT solutions based on a case study of the EU's eCustoms initiatives using Manuel DeLanda's Assemblage Theory. Technological innovations have enabled information infrastructures with dramatically increased number and heterogeneity of included components, and their dynamic and unexpected interactions. Unfortunately, lack of understanding...

    Provided By University of Orleans

  • White Papers // Nov 2012

    LEARS: A Lockless, Relaxed-Atomicity State Model for Parallel Execution of a Game Server Partition

    Supporting thousands of interacting players in a virtual world poses huge challenges with respect to processing. Existing paper that addresses the challenge utilizes a variety of spatial partitioning algorithms to distribute the load. If, however, a large number of players need to interact tightly across an area of the game...

    Provided By University of Orleans

  • White Papers // Nov 2012

    Bayllocator: A Proactive System to Predict Server Utilization and Dynamically Allocate Memory Resources Using Bayesian Networks and Ballooning

    With the advent of virtualization and cloud computing, virtualized systems can be found from small companies to service providers and big data centers. All of them use this technology because of the many benefits it has to offer, such as a greener ICT, cost reduction, improved profitability, uptime, flexibility in...

    Provided By University of Orleans

  • White Papers // Oct 2012

    Large-Scale Peer-to-Peer Discovery Mechanism and Architecture for Frequency Allocation

    Scarcity of frequencies combined with the demand for more bandwidth is likely to increase the need for devices that provide high wireless bandwidth in limited areas while using a wired network to carry data over longer distances. Examples of such devices are Wi-Fi routers and femtocells and future devices that...

    Provided By University of Orleans

  • White Papers // Sep 2012

    Service Provider Authentication Assurance

    The concept of authentication assurance traditionally refers to the robustness of methods and mechanisms for user authentication, including the robustness of initial registration and provisioning of user credentials, as well as the robustness of mechanisms that enforce user authentication during operation. However, the user is not the only party that...

    Provided By University of Orleans

  • White Papers // Aug 2012

    Performance of On-Off Traffic Stemming From Live Adaptive Segmented HTTP Video Streaming

    A large number of live segmented adaptive HTTP video streaming services exist in the Internet today. These quasi-live solutions have been shown to scale to a large number of concurrent users, but the characteristic on-off traffic pattern makes TCP behave differently compared to the bulk transfers the protocol is designed...

    Provided By University of Orleans

  • White Papers // Jul 2012

    Modeling Resource-Aware Virtualized Applications for the Cloud in Real-Time ABS

    An application's Quality of Service (QoS) depends on resource availability; e.g., response time is worse on a slow machine. On the cloud, a virtualized application leases resources which are made available on demand. When its work load increases, the application must decide whether to reduce QoS or increase cost. Virtualized...

    Provided By University of Orleans

  • White Papers // May 2012

    Towards CloudML, a Model-Based Approach to Provision Resources in the Clouds

    The Cloud-computing paradigm advocates the use of re-sources available \"In the clouds\". In front of the multiplicity of cloud providers, it becomes cumbersome to manually tackle this heterogeneity. In this paper, the authors propose to de ne an abstraction layer used to model resources available in the clouds. This cloud...

    Provided By University of Orleans

  • White Papers // May 2012

    On-Demand Cognitive Radio Communications for Smart Grid

    Smart Grid (SG) is an efficient technology for electrical power distribution and management by incorporating two-way communications between utilities and customers. The versatile features of Cognitive Radio (CR) technology meet the requirements of SG communication and have drawn much attention. In this paper, the authors study the On-Demand cognitive radio...

    Provided By University of Orleans

  • White Papers // May 2012

    Interpretation and Fusion of Hyper Opinions in Subjective Logic

    The need to fuse beliefs from different sources occurs in many situations. For example, multiple agents can fuse their preferences about alternatives in order to make a single choice, or the output of multiple sensors can be fused to determine which of multiple possible events is most likely to have...

    Provided By University of Orleans

  • White Papers // May 2012

    T102: SSL Security Threats

    Secure Socket Layer (SSL) is a protocol developed by Netscape. Its purpose is to ensure message integrity and confidentiality. The first draft of SSL (version 1.0) was never released. This is a home exam written for the subject INF3510 - information security. This paper will illuminate the threats toward the...

    Provided By University of Orleans

  • White Papers // May 2012

    Robustness of Trust and Reputation Systems: Does It Matter?

    Trust and reputation systems provide a foundation for security, stability, and efficiency in the online environment because of their ability to stimulate quality and to sanction poor quality. Trust and reputation scores are assumed to represent and predict future quality and behaviour and thereby to provide valuable decision support for...

    Provided By University of Orleans

  • White Papers // Apr 2012

    Low-Level Scheduling Implications for Data-Intensive Cyclic Workloads on Modern Microarchitectures

    Processing data intensive multimedia workloads is challenging, and scheduling and resource management are vitally important for the best possible utilization of machine resources. In earlier work, the authors have used work-stealing, which is frequently used today, and proposed improvements. They found already then that no singular work-stealing variant is ideally...

    Provided By University of Orleans

  • White Papers // Apr 2012

    Trust and Identity Management for Internet and Mobile Computing

    The convergence of Internet and mobile computing creates a potent capability of personalised access to online services everywhere and anytime. Ubiquitous access opens up to new business models and stimulates vigorous investment and rapid innovation. Unfortunately, new technologies usually cause new vulnerabilities and threats, new business model bring more incentives...

    Provided By University of Orleans

  • White Papers // Mar 2012

    A Two-Hop Localization Scheme With Radio Irregularity Model in Wireless Sensor Networks

    Localization is a vital foundation in Wireless Sensor Networks (WSNs). However, most previous localization methods assume an idealistic radio propagation model that is far from reality. This will lead to inaccurate localization, since unknown nodes cannot receive enough location messages under the radio irregularity model. In the authors' previous work...

    Provided By University of Orleans

  • White Papers // Feb 2012

    Risk-Driven Security Testing Versus Test-Driven Security Risk Analysis

    Security testing is a process to determine that an information system protects data and maintains functionality as intended. It is important to clearly distinguish the combinations of security testing and security risk analysis depending on whether it is viewed from a security testing perspective or a security risk analysis perspective....

    Provided By University of Orleans

  • White Papers // Oct 2011

    Spatial Flicker Effect in Video Scaling

    Scalable video streaming may result in flicker effects - visual artifacts in video presentation due to adaptive layer switching. In the authors' paper, they have identified three types of flicker, noise, blur and motion flicker. Here, they investigate the blur and noise flicker, which are both related to the spatial...

    Provided By University of Orleans

  • White Papers // Oct 2011

    Bitrate and Video Quality Planning for Mobile Streaming Scenarios Using a GPS-Based Bandwidth Lookup Service

    One of the main challenges when streaming video to mobile devices is to handle fluctuating bandwidth and frequent network outages as the device is brought in and out of areas with network coverage. In this paper, the authors propose bitrate and video quality planning algorithms for mobile streaming scenarios using...

    Provided By University of Orleans

  • White Papers // Sep 2011

    Improved Multi-Rate Video Encoding

    Adaptive HTTP streaming is frequently used for both live and on-Demand video delivery over the Internet. In this paper, the authors address the resource consumption issues by proposing a method for reusing redundant steps in a video encoder, emitting multiple outputs with varying bitrates and qualities. It shares and reuses...

    Provided By University of Orleans

  • White Papers // Aug 2011

    A Demonstration Of a Lockless, Relaxed Atomicity State Parallel Game Server (LEARS)

    Games where thousands of players can interact concurrently pose many challenges with regards to the massive parallelism. Earlier paper within the field suggests that this is difficult due to synchronization issues. In this paper, the authors present an implementation of a game server architecture based on a model that allows...

    Provided By University of Orleans

  • White Papers // Jul 2011

    Search-Based Composition, Streaming and Playback of Video Archive Content

    Locating content in existing video archives is both a time and bandwidth consuming process since users might have to download and manually watch large portions of superfluous videos. In this paper, the authors present two novel prototypes using an Internet based video composition and streaming system with a keyword-based search...

    Provided By University of Orleans

  • White Papers // Jul 2011

    Evaluation of Interference Requirements in a Sensor Network Aided Cognitive Radio System

    To better exploit the spectrum resources a wireless sensor network can be used to assists a secondary cognitive radio network by providing information about the current primary spectrum occupancy. In this paper, the authors study the performance of the secondary network when it is co-located with and having similar cell...

    Provided By University of Orleans

  • White Papers // Jul 2011

    Wireless Water Quality Monitoring in the ISM Frequency Band: A Software and Cognitive Radio Approach

    A long-range transmission demonstrator for low data rate environmental sensor networks is under development. It uses the ISM free-access frequency band at 433 MHz. In addition to distance attenuation, a major issue is the presence of numerous radio frequency interferences in this band. With a view to optimizing the sensor...

    Provided By University of Orleans

  • White Papers // Jun 2011

    P2G: A Framework for Distributed Real-Time Processing of Multimedia Data

    The computational demands of multimedia data processing are steadily increasing as consumers call for progressively more complex and intelligent multimedia services. New multi-core hardware architectures provide the required resources, but writing parallel, distributed applications remains a labor-intensive task compared to their sequential counter-part. For this reason, Google and Microsoft implemented...

    Provided By University of Orleans

  • White Papers // Jun 2011

    Using Multiple Links to Increase the Performance of Bandwidth-Intensive UDP-Based Applications

    Networked devices often come equipped with multiple network interfaces, and bandwidth aggregation is one of the many possible benefits of using multiple interfaces simultaneously. In this paper, the authors present a transparent solution for proxy-based bandwidth aggregation that is able to overcome the different deployment and link heterogeneity challenges present...

    Provided By University of Orleans

  • White Papers // Apr 2011

    Performance of a Sensor Network Aided Cognitive Radio System

    A sensor network aided cognitive radio network uses the concept of a wireless sensor network that assists a cognitive radio network by providing information about the current primary spectrum occupancy. In this paper, the authors study the performance of the cognitive network for various cell sizes and transmit power levels...

    Provided By University of Orleans

  • White Papers // Mar 2011

    Distributed Real-Time Processing of Multimedia Data with the P2G Framework

    As the number of multimedia services grows, so does the computational demands on multimedia data processing. New multi-core hardware architectures provide the required re-sources, however, parallel, distributed applications are much harder to write than sequential programs. Large processing frameworks like Google's MapReduce and Microsoft's Dryad are steps in the right...

    Provided By University of Orleans

  • White Papers // Nov 2010

    Personal Federation Control With the Identity Dashboard

    Current federated identity management solutions for open networks do not solve the scalability problems for users. In some cases, federation might even increase the identity management complexity that users need to handle. Solutions should empower users to actively participate in making decisions about their identity, but this is far from...

    Provided By University of Orleans

  • White Papers // Nov 2010

    Display Security for Online Transactions: SMS-Based Authentication Scheme

    Secure online transactions with human users normally require visual display for verifying the correctness of central elements of the transaction before it is submitted. When commodity computer platforms get exposed to the internet, even for a short period, there is a real and substantial risk that they become infected with...

    Provided By University of Orleans

  • White Papers // Nov 2010

    Vulnerabilities in Personal Firewalls Caused by Poor Security Usability

    Poor usability of IT security present a serious security vulnerability which can be exploited to compromise systems that are otherwise secure. This is of particular concern when considering that the majority of people connecting to the Internet are not experts in IT security. Personal firewalls represent the most important security...

    Provided By University of Orleans

  • White Papers // Sep 2010

    Privacy Policy Referencing

    Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd party access. Currently, servers are connected to the Internet, where large amounts of personal information are continuously being exchanged as part of application transactions. This...

    Provided By University of Orleans

  • White Papers // Aug 2010

    Components and Aspects Composition Planning for Ubiquitous Adaptive Services

    In ubiquitous environments, resources limitations and fluctuations combined with device mobility requires the dynamic adaptation of mobile applications. This paper reports on an extension of the MUSIC adaptation middleware to support aspect-oriented programming in order to handle cross-cutting adaptations. Basically, this extension specifies an architectural model for defining applications as...

    Provided By University of Orleans

  • White Papers // Oct 2011

    Spatial Flicker Effect in Video Scaling

    Scalable video streaming may result in flicker effects - visual artifacts in video presentation due to adaptive layer switching. In the authors' paper, they have identified three types of flicker, noise, blur and motion flicker. Here, they investigate the blur and noise flicker, which are both related to the spatial...

    Provided By University of Orleans

  • White Papers // Oct 2011

    Bitrate and Video Quality Planning for Mobile Streaming Scenarios Using a GPS-Based Bandwidth Lookup Service

    One of the main challenges when streaming video to mobile devices is to handle fluctuating bandwidth and frequent network outages as the device is brought in and out of areas with network coverage. In this paper, the authors propose bitrate and video quality planning algorithms for mobile streaming scenarios using...

    Provided By University of Orleans

  • White Papers // Jun 2011

    P2G: A Framework for Distributed Real-Time Processing of Multimedia Data

    The computational demands of multimedia data processing are steadily increasing as consumers call for progressively more complex and intelligent multimedia services. New multi-core hardware architectures provide the required resources, but writing parallel, distributed applications remains a labor-intensive task compared to their sequential counter-part. For this reason, Google and Microsoft implemented...

    Provided By University of Orleans

  • White Papers // Jun 2011

    Using Multiple Links to Increase the Performance of Bandwidth-Intensive UDP-Based Applications

    Networked devices often come equipped with multiple network interfaces, and bandwidth aggregation is one of the many possible benefits of using multiple interfaces simultaneously. In this paper, the authors present a transparent solution for proxy-based bandwidth aggregation that is able to overcome the different deployment and link heterogeneity challenges present...

    Provided By University of Orleans

  • White Papers // Nov 2009

    Program Obfuscation by Strong Cryptography

    In this paper, the authors present a program obfuscation method that is based on the combination of strong encryption of code and data and a CPU simulator (CSPIM) that implements the MIPS I instruction set. Their method is different from existing methods in that only a single word (32-bits) of...

    Provided By University of Orleans

  • White Papers // Sep 2009

    Enhancing Video-on-Demand Playout Over Multiple Heterogeneous Access Networks

    Multimedia streaming is increasing in popularity and has become one of the dominating services on the Internet today. In this paper, the authors explore the challenges and potential benefits of using multiple access networks simultaneously. Exploiting HTTP's capability of handling requests for specific byte ranges of a file; they present...

    Provided By University of Orleans

  • White Papers // Mar 2011

    Distributed Real-Time Processing of Multimedia Data with the P2G Framework

    As the number of multimedia services grows, so does the computational demands on multimedia data processing. New multi-core hardware architectures provide the required re-sources, however, parallel, distributed applications are much harder to write than sequential programs. Large processing frameworks like Google's MapReduce and Microsoft's Dryad are steps in the right...

    Provided By University of Orleans

  • White Papers // Oct 2009

    Constructing Low-Latency Overlay Networks: Tree vs. Mesh Algorithms

    Distributed interactive applications may have stringent latency requirements and dynamic user groups. These applications may benefit from a group communication system, and to improve the system support for such applications, the authors investigate graph algorithms that construct low-latency overlay networks for application-layer multicast. In particular, they focus on reducing the...

    Provided By University of Orleans

  • White Papers // Dec 2009

    Minimum SER Block Precoding and Equalization for Frequency-Selective Fading Channels

    In this paper, the authors study the joint transmitter and receiver design problem over frequency-selective fading channels. Motivated by the conventional MMSE-DFE, they present a simple approximate ML decision feedback equalizer at the receiver. They then perform pre-coding in a downlink scenario at the transmitter side to minimize the analytical...

    Provided By University of Orleans

  • White Papers // Oct 2009

    Interference Cancellation by Using Quasi-Orthogonal STBC in Two-User MIMO System

    Multiple-Input Multiple-Output (MIMO) communication systems are used to provide high capacity and diversity gains as compared to Single-Input Single-Output (SISO) systems. Orthogonal Space-Time Block Codes (OSTBCs) is a popular choice for MIMO systems as they provide symbol wise decoupled decoding along with full diversity,. However, they are available for limited...

    Provided By University of Orleans

  • White Papers // Apr 2009

    A Simple Scheme for Delay-Tolerant Decode-and-Forward Based Cooperative Communication

    Cooperative communications have several promising features to become a main technology in future wireless communications systems. In this paper, the authors study how to improve the performance of a decode-and-forward protocol based cooperative system over the delay constrained channels. They propose a simple transmission scheme, which makes the cooperative system...

    Provided By University of Orleans

  • White Papers // Dec 2008

    Precoding of (Non) Orthogonal Space-Time Block Codes Over Arbitrarily Correlated Rayleigh Channel

    Multiple-Input Multiple-Output (MIMO) communications systems have drawn a lot of attention. They provide high capacity and diversity gains as compared to Single-Input Single-Output (SISO) systems and, therefore, MIMO systems are suitable for the high data rates required by the next generation wireless communication systems. In MIMO systems, Space-Time Block Codes...

    Provided By University of Orleans

  • White Papers // Sep 2009

    Amplify-and-Forward Cooperative Communications Using Double-Differential Modulation Over Nakagami-M Channels

    In this paper, the authors propose Double-Differential (DD) modulation for an amplify-and-forward protocol based on cooperative communication over Nakagami-m fading channels. The proposed scheme is able to achieve performance gain in the presence of random carrier offsets and without channel knowledge at relay or destination. The proposed scheme reflects its...

    Provided By University of Orleans

  • White Papers // Jul 2012

    Modeling Resource-Aware Virtualized Applications for the Cloud in Real-Time ABS

    An application's Quality of Service (QoS) depends on resource availability; e.g., response time is worse on a slow machine. On the cloud, a virtualized application leases resources which are made available on demand. When its work load increases, the application must decide whether to reduce QoS or increase cost. Virtualized...

    Provided By University of Orleans

  • White Papers // Oct 2009

    Orthogonal Code Design for MIMO Amplify-and-Forward Cooperative Networks

    In this paper is on the design of practical distributed space-time codes for wireless relay networks with multiple antennas terminals. The amplify-and-forward scheme is used in a way that each relay transmits a scaled version of the linear combination of the received symbols. They propose distributed orthogonal space-time codes which...

    Provided By University of Orleans

  • White Papers // Oct 2009

    Security Properties in an Open Peer-to-Peer Network

    This paper proposes to address new requirements of confidentiality, integrity and availability properties fitting to peer-to-peer domains of resources. The enforcement of security properties in an open peer-to-peer network remains an open problem as the literature have mainly proposed contribution on availability of resources and anonymity of users. That paper...

    Provided By University of Orleans

  • White Papers // Apr 2010

    A Contribution To The Schumpeterian Growth Theory And Empirics

    This paper proposes an integrated theoretical and methodological framework characterized by technological interactions to explain growth processes from a Schumpeterian perspective. Global interdependence implied by international R&D spillovers needs to be taken into account in the theoretical model as well as in the empirical model. The spatial econometric methodology is...

    Provided By University of Orleans

  • White Papers // Feb 2009

    The Impact Of Financial Markets Globalization On Companies Capital Structure

    Insuring the assets financing was a permanent concern in the companies. The aim of the financing policy was to identify the most profitable financing sources for the company, at the lowest cost possible and correlated in time with the need of resources. The modeling of the cost of capital, as...

    Provided By University of Orleans

  • White Papers // Jul 2011

    Wireless Water Quality Monitoring in the ISM Frequency Band: A Software and Cognitive Radio Approach

    A long-range transmission demonstrator for low data rate environmental sensor networks is under development. It uses the ISM free-access frequency band at 433 MHz. In addition to distance attenuation, a major issue is the presence of numerous radio frequency interferences in this band. With a view to optimizing the sensor...

    Provided By University of Orleans

  • White Papers // Apr 2012

    Trust and Identity Management for Internet and Mobile Computing

    The convergence of Internet and mobile computing creates a potent capability of personalised access to online services everywhere and anytime. Ubiquitous access opens up to new business models and stimulates vigorous investment and rapid innovation. Unfortunately, new technologies usually cause new vulnerabilities and threats, new business model bring more incentives...

    Provided By University of Orleans

  • White Papers // May 2012

    Interpretation and Fusion of Hyper Opinions in Subjective Logic

    The need to fuse beliefs from different sources occurs in many situations. For example, multiple agents can fuse their preferences about alternatives in order to make a single choice, or the output of multiple sensors can be fused to determine which of multiple possible events is most likely to have...

    Provided By University of Orleans

  • White Papers // Sep 2012

    Service Provider Authentication Assurance

    The concept of authentication assurance traditionally refers to the robustness of methods and mechanisms for user authentication, including the robustness of initial registration and provisioning of user credentials, as well as the robustness of mechanisms that enforce user authentication during operation. However, the user is not the only party that...

    Provided By University of Orleans

  • White Papers // May 2012

    Robustness of Trust and Reputation Systems: Does It Matter?

    Trust and reputation systems provide a foundation for security, stability, and efficiency in the online environment because of their ability to stimulate quality and to sanction poor quality. Trust and reputation scores are assumed to represent and predict future quality and behaviour and thereby to provide valuable decision support for...

    Provided By University of Orleans

  • White Papers // Nov 2010

    Vulnerabilities in Personal Firewalls Caused by Poor Security Usability

    Poor usability of IT security present a serious security vulnerability which can be exploited to compromise systems that are otherwise secure. This is of particular concern when considering that the majority of people connecting to the Internet are not experts in IT security. Personal firewalls represent the most important security...

    Provided By University of Orleans

  • White Papers // Nov 2010

    Personal Federation Control With the Identity Dashboard

    Current federated identity management solutions for open networks do not solve the scalability problems for users. In some cases, federation might even increase the identity management complexity that users need to handle. Solutions should empower users to actively participate in making decisions about their identity, but this is far from...

    Provided By University of Orleans

  • White Papers // Sep 2010

    Privacy Policy Referencing

    Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd party access. Currently, servers are connected to the Internet, where large amounts of personal information are continuously being exchanged as part of application transactions. This...

    Provided By University of Orleans

  • White Papers // Oct 2009

    Consequences of Botnets Spreading to Mobile Devices

    Botnets represent a serious security threat on the Internet. Current security mechanism are typically inadequate for protecting against the latest breed of botnets, as botherders constantly develop new techniques and methods to frustrate investigators. Until recently, mobile networks have been relatively isolated from the Internet, so there has been little...

    Provided By University of Orleans

  • White Papers // Jul 2011

    Evaluation of Interference Requirements in a Sensor Network Aided Cognitive Radio System

    To better exploit the spectrum resources a wireless sensor network can be used to assists a secondary cognitive radio network by providing information about the current primary spectrum occupancy. In this paper, the authors study the performance of the secondary network when it is co-located with and having similar cell...

    Provided By University of Orleans

  • White Papers // Apr 2011

    Performance of a Sensor Network Aided Cognitive Radio System

    A sensor network aided cognitive radio network uses the concept of a wireless sensor network that assists a cognitive radio network by providing information about the current primary spectrum occupancy. In this paper, the authors study the performance of the cognitive network for various cell sizes and transmit power levels...

    Provided By University of Orleans

  • White Papers // Apr 2010

    Energy Minimization Approach for Optimal Cooperative Spectrum Sensing in Sensor-Aided Cognitive Radio Networks

    In a sensor-aided cognitive radio network, collaborating battery-powered sensors are deployed to aid the network in cooperative spectrum sensing. These sensors consume energy for spectrum sensing and therefore deplete their life-time, thus the authors study the key issue in minimizing the sensing energy consumed by such group of collaborating sensors....

    Provided By University of Orleans

  • White Papers // Oct 2012

    Large-Scale Peer-to-Peer Discovery Mechanism and Architecture for Frequency Allocation

    Scarcity of frequencies combined with the demand for more bandwidth is likely to increase the need for devices that provide high wireless bandwidth in limited areas while using a wired network to carry data over longer distances. Examples of such devices are Wi-Fi routers and femtocells and future devices that...

    Provided By University of Orleans

  • White Papers // May 2012

    On-Demand Cognitive Radio Communications for Smart Grid

    Smart Grid (SG) is an efficient technology for electrical power distribution and management by incorporating two-way communications between utilities and customers. The versatile features of Cognitive Radio (CR) technology meet the requirements of SG communication and have drawn much attention. In this paper, the authors study the On-Demand cognitive radio...

    Provided By University of Orleans

  • White Papers // Mar 2012

    A Two-Hop Localization Scheme With Radio Irregularity Model in Wireless Sensor Networks

    Localization is a vital foundation in Wireless Sensor Networks (WSNs). However, most previous localization methods assume an idealistic radio propagation model that is far from reality. This will lead to inaccurate localization, since unknown nodes cannot receive enough location messages under the radio irregularity model. In the authors' previous work...

    Provided By University of Orleans

  • White Papers // Nov 2012

    Bayllocator: A Proactive System to Predict Server Utilization and Dynamically Allocate Memory Resources Using Bayesian Networks and Ballooning

    With the advent of virtualization and cloud computing, virtualized systems can be found from small companies to service providers and big data centers. All of them use this technology because of the many benefits it has to offer, such as a greener ICT, cost reduction, improved profitability, uptime, flexibility in...

    Provided By University of Orleans

  • White Papers // Aug 2012

    Performance of On-Off Traffic Stemming From Live Adaptive Segmented HTTP Video Streaming

    A large number of live segmented adaptive HTTP video streaming services exist in the Internet today. These quasi-live solutions have been shown to scale to a large number of concurrent users, but the characteristic on-off traffic pattern makes TCP behave differently compared to the bulk transfers the protocol is designed...

    Provided By University of Orleans

  • White Papers // Apr 2012

    Low-Level Scheduling Implications for Data-Intensive Cyclic Workloads on Modern Microarchitectures

    Processing data intensive multimedia workloads is challenging, and scheduling and resource management are vitally important for the best possible utilization of machine resources. In earlier work, the authors have used work-stealing, which is frequently used today, and proposed improvements. They found already then that no singular work-stealing variant is ideally...

    Provided By University of Orleans

  • White Papers // Jul 2011

    Search-Based Composition, Streaming and Playback of Video Archive Content

    Locating content in existing video archives is both a time and bandwidth consuming process since users might have to download and manually watch large portions of superfluous videos. In this paper, the authors present two novel prototypes using an Internet based video composition and streaming system with a keyword-based search...

    Provided By University of Orleans

  • White Papers // Sep 2011

    Improved Multi-Rate Video Encoding

    Adaptive HTTP streaming is frequently used for both live and on-Demand video delivery over the Internet. In this paper, the authors address the resource consumption issues by proposing a method for reusing redundant steps in a video encoder, emitting multiple outputs with varying bitrates and qualities. It shares and reuses...

    Provided By University of Orleans

  • White Papers // May 2012

    Towards CloudML, a Model-Based Approach to Provision Resources in the Clouds

    The Cloud-computing paradigm advocates the use of re-sources available \"In the clouds\". In front of the multiplicity of cloud providers, it becomes cumbersome to manually tackle this heterogeneity. In this paper, the authors propose to de ne an abstraction layer used to model resources available in the clouds. This cloud...

    Provided By University of Orleans

  • White Papers // Aug 2010

    Components and Aspects Composition Planning for Ubiquitous Adaptive Services

    In ubiquitous environments, resources limitations and fluctuations combined with device mobility requires the dynamic adaptation of mobile applications. This paper reports on an extension of the MUSIC adaptation middleware to support aspect-oriented programming in order to handle cross-cutting adaptations. Basically, this extension specifies an architectural model for defining applications as...

    Provided By University of Orleans