University of Osnabrueck

Displaying 1-19 of 19 results

  • White Papers // Apr 2014

    The Design of Multidimensional Data Model Using Principles of the Anchor Data Modeling: An Assessment of Experimental Approach Based on Query Execution Performance

    The decision making processes need to reflect changes in the business world in a multidimensional way. This paper includes also similar way of viewing the data for carrying out key decisions that ensure competitiveness of the business. In this paper, the authors focus on the Business Intelligence system as a...

    Provided By University of Osnabrueck

  • White Papers // May 2013

    QuickXDB: A Prototype of a Native XML DBMS

    XML (Extensible Mark-up Language) is a well established format which is often used for semi-structured data modeling. XPath and XQuery are de facto standards among XML query languages. There are a large number of different approaches addressing an efficient XQuery processing. This paper is to introduce a prototype of an...

    Provided By University of Osnabrueck

  • White Papers // Mar 2013

    Data Mining by Symbolic Fuzzy Classifiers and Genetic Programming - State of the Art and Prospective Approaches

    There are various techniques for data mining and data analysis. Data mining is very important in the information retrieval areas especially when the data amounts are very large. Among them, hybrid approaches combining two or more algorithms gain importance as the complexity and dimension of real world data sets grows....

    Provided By University of Osnabrueck

  • White Papers // Jan 2013

    Security of Information Flows in Transport, as an Important Item of Crisis Management Within Transport Systems

    Transport systems, due to performed tasks and processes, are generally functioning within wide areas. In this paper, the authors describe main aspects concerning security of information exchanged within transport systems. Definition of critical infrastructure and main matters coming out of fact transport systems are included in there, have been specified....

    Provided By University of Osnabrueck

  • White Papers // Dec 2012

    A Fingerprinting System Calls Approach for Intrusion Detection in a Cloud Environment

    Cloud computing envisioned as the next generation architecture for IT enterprises, has proliferated itself due to the advantages it provides. Cloud computing provides solutions for carrying out efficient, scalable and low cost computing. Due to the distributed nature of cloud based system, it is vulnerable to a large category of...

    Provided By University of Osnabrueck

  • White Papers // Sep 2012

    Reconstruction of the Conceptual Model from the Implemented Database

    The paper deals with reconstructing the conceptual model from the implemented database. Sometimes the conceptual model of the implemented database is missing and is appropriate to reconstruct the conceptual model from the implemented database to understand the content of the database and for effective additional development or maintained. The authors...

    Provided By University of Osnabrueck

  • White Papers // Sep 2012

    A Tool for Database Testing and Optimization

    The paper deals with testing database against original requirements for its creation. Currently there are several tools for unit database testing, testing stored procedures and functions in database or performance and load testing of relational database. But there is no tool for testing logical model of the relational database against...

    Provided By University of Osnabrueck

  • White Papers // Aug 2012

    Segments of ICT Users Among SME in Moravian Silesian Region Using Cluster Analysis and AHP

    The paper deals with identification of segments of SME in Moravian Silesian Region (MSR) based upon a survey of Information and Communication Technologies (ICT) utilization among Small and Medium Enterprises (SME). The aim of the paper is to suggest a segmentation of SME with regard to the level of ICT...

    Provided By University of Osnabrueck

  • White Papers // May 2012

    The Bayesian Spam Filter with NCD

    Undesired e-mail (spam) becomes a big problem nowadays not only for users, but also for Internet providers. One of the main obstacles for elimination of this problem is a complicated security issues. In particular, the very low rate of falsely detected e-mails in practice. The authors tried to eliminate this...

    Provided By University of Osnabrueck

  • White Papers // Dec 2011

    Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

    SIP PBX is definitely the alpha and omega of any IP telephony infrastructure and frequently also provides other services than those related to VoIP traffic. These exchanges are, however, very often the target of attacks by external actors. The paper describes a system that was developed on VSB-TU Ostrava as...

    Provided By University of Osnabrueck

  • White Papers // May 2011

    Flexible Cache for a Database Management Systems

    Cache of a persistent data structure represents an important part, which significantly influence its efficiency. Cache consists from an array of main memory blocks (called cache nodes) with a constant size. Cache nodes buffer the data structure nodes hence they can be accessed quickly. However, data structure nodes do not...

    Provided By University of Osnabrueck

  • White Papers // May 2011

    Using SVM and Clustering Algorithms in IDS Systems

    Intrusion Detection System (IDS) is a system that monitors network traffic and tries to detect suspicious activity. In this paper, the authors discuss the possibilities of application of clustering algorithms and Support Vector Machines (SVM) for use in the IDS. There, they used K-means, FarthestFirst and COBWEB algorithms as clustering...

    Provided By University of Osnabrueck

  • White Papers // Oct 2010

    Advanced Implementation of IP Telephony at Czech Universities

    IP telephony is convenient way of communication and brings number of benefits. One of them is the fact that many services can be implemented in a original way and it opens new field of research and is a challenge for designers of communication solutions especially based on open-source platform. This...

    Provided By University of Osnabrueck

  • White Papers // Sep 2010

    Attacks to Cryptography Protocols Of Wireless Industrial Communication Systems

    In this paper, the authors deal with problems of safety and security principles within wireless industrial communication systems. First safety requirements to wireless industrial communication system, summarization of attack methods and the available measures for risks elimination are described with orientation to safety critical applications. The mainly part is oriented...

    Provided By University of Osnabrueck

  • White Papers // Aug 2010

    On Support of Ordering in Multidimensional Data Structures

    Multidimensional data structures are applied in many areas, e.g. in data mining, indexing multimedia data and text documents, and so on. There are some applications where the range query result must be ordered. A typical case is the result with tuples sorted according to values in one dimension defined by...

    Provided By University of Osnabrueck

  • White Papers // Mar 2010

    Security Risks in IP Telephony

    In this paper, the authors deal with VoIP communication security and various techniques of VoIP attacks. The authors divided these threats in several categories according to their specific behavior and their impact on the affected system. They also tried to find effective methods to prevent or mitigate these attacks. They...

    Provided By University of Osnabrueck

  • White Papers // Jun 2009

    Compression of the Stream Array Data Structure

    In recent years, many approaches to XML Twig Pattern Query (TPQ) processing have been developed. Some algorithms are supported by a stream abstract data type. Stream is an abstract data type usually implemented using inverted list or special purpose data structure. In this paper, the authors focus on an efficient...

    Provided By University of Osnabrueck

  • White Papers // Feb 2009

    A Description of Semi-automatic Creation of Requirements Specification from Business Activities

    One of the main purposes of the authors' paper is to propose that the realization of the idea \"Create business processes and transform business processes to the requirement specification\" might be very useful in the first phase of the software development process. In this paper, they present a usage of...

    Provided By University of Osnabrueck

  • White Papers // Feb 2009

    Credit Market Imperfections, Financial Market Regulation And Business Cycles In Eastern Europe

    Credit market imperfections give rise to boom-bust cycle episodes in emerging markets. In the present paper, the authors aim to provide a comprehensive analysis for Eastern Europe. They focus on documenting credit market imperfections, asymmetric financing opportunities across sectors, and business cycle fluctuations at the aggregate and sectoral level. The...

    Provided By University of Osnabrueck

  • White Papers // Oct 2010

    Advanced Implementation of IP Telephony at Czech Universities

    IP telephony is convenient way of communication and brings number of benefits. One of them is the fact that many services can be implemented in a original way and it opens new field of research and is a challenge for designers of communication solutions especially based on open-source platform. This...

    Provided By University of Osnabrueck

  • White Papers // Sep 2012

    Reconstruction of the Conceptual Model from the Implemented Database

    The paper deals with reconstructing the conceptual model from the implemented database. Sometimes the conceptual model of the implemented database is missing and is appropriate to reconstruct the conceptual model from the implemented database to understand the content of the database and for effective additional development or maintained. The authors...

    Provided By University of Osnabrueck

  • White Papers // Sep 2012

    A Tool for Database Testing and Optimization

    The paper deals with testing database against original requirements for its creation. Currently there are several tools for unit database testing, testing stored procedures and functions in database or performance and load testing of relational database. But there is no tool for testing logical model of the relational database against...

    Provided By University of Osnabrueck

  • White Papers // Aug 2012

    Segments of ICT Users Among SME in Moravian Silesian Region Using Cluster Analysis and AHP

    The paper deals with identification of segments of SME in Moravian Silesian Region (MSR) based upon a survey of Information and Communication Technologies (ICT) utilization among Small and Medium Enterprises (SME). The aim of the paper is to suggest a segmentation of SME with regard to the level of ICT...

    Provided By University of Osnabrueck

  • White Papers // Feb 2009

    A Description of Semi-automatic Creation of Requirements Specification from Business Activities

    One of the main purposes of the authors' paper is to propose that the realization of the idea \"Create business processes and transform business processes to the requirement specification\" might be very useful in the first phase of the software development process. In this paper, they present a usage of...

    Provided By University of Osnabrueck

  • White Papers // Mar 2010

    Security Risks in IP Telephony

    In this paper, the authors deal with VoIP communication security and various techniques of VoIP attacks. The authors divided these threats in several categories according to their specific behavior and their impact on the affected system. They also tried to find effective methods to prevent or mitigate these attacks. They...

    Provided By University of Osnabrueck

  • White Papers // Jan 2013

    Security of Information Flows in Transport, as an Important Item of Crisis Management Within Transport Systems

    Transport systems, due to performed tasks and processes, are generally functioning within wide areas. In this paper, the authors describe main aspects concerning security of information exchanged within transport systems. Definition of critical infrastructure and main matters coming out of fact transport systems are included in there, have been specified....

    Provided By University of Osnabrueck

  • White Papers // Sep 2010

    Attacks to Cryptography Protocols Of Wireless Industrial Communication Systems

    In this paper, the authors deal with problems of safety and security principles within wireless industrial communication systems. First safety requirements to wireless industrial communication system, summarization of attack methods and the available measures for risks elimination are described with orientation to safety critical applications. The mainly part is oriented...

    Provided By University of Osnabrueck

  • White Papers // Dec 2011

    Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

    SIP PBX is definitely the alpha and omega of any IP telephony infrastructure and frequently also provides other services than those related to VoIP traffic. These exchanges are, however, very often the target of attacks by external actors. The paper describes a system that was developed on VSB-TU Ostrava as...

    Provided By University of Osnabrueck

  • White Papers // Dec 2012

    A Fingerprinting System Calls Approach for Intrusion Detection in a Cloud Environment

    Cloud computing envisioned as the next generation architecture for IT enterprises, has proliferated itself due to the advantages it provides. Cloud computing provides solutions for carrying out efficient, scalable and low cost computing. Due to the distributed nature of cloud based system, it is vulnerable to a large category of...

    Provided By University of Osnabrueck

  • White Papers // May 2011

    Flexible Cache for a Database Management Systems

    Cache of a persistent data structure represents an important part, which significantly influence its efficiency. Cache consists from an array of main memory blocks (called cache nodes) with a constant size. Cache nodes buffer the data structure nodes hence they can be accessed quickly. However, data structure nodes do not...

    Provided By University of Osnabrueck

  • White Papers // May 2013

    QuickXDB: A Prototype of a Native XML DBMS

    XML (Extensible Mark-up Language) is a well established format which is often used for semi-structured data modeling. XPath and XQuery are de facto standards among XML query languages. There are a large number of different approaches addressing an efficient XQuery processing. This paper is to introduce a prototype of an...

    Provided By University of Osnabrueck

  • White Papers // Jun 2009

    Compression of the Stream Array Data Structure

    In recent years, many approaches to XML Twig Pattern Query (TPQ) processing have been developed. Some algorithms are supported by a stream abstract data type. Stream is an abstract data type usually implemented using inverted list or special purpose data structure. In this paper, the authors focus on an efficient...

    Provided By University of Osnabrueck

  • White Papers // Aug 2010

    On Support of Ordering in Multidimensional Data Structures

    Multidimensional data structures are applied in many areas, e.g. in data mining, indexing multimedia data and text documents, and so on. There are some applications where the range query result must be ordered. A typical case is the result with tuples sorted according to values in one dimension defined by...

    Provided By University of Osnabrueck

  • White Papers // May 2011

    Using SVM and Clustering Algorithms in IDS Systems

    Intrusion Detection System (IDS) is a system that monitors network traffic and tries to detect suspicious activity. In this paper, the authors discuss the possibilities of application of clustering algorithms and Support Vector Machines (SVM) for use in the IDS. There, they used K-means, FarthestFirst and COBWEB algorithms as clustering...

    Provided By University of Osnabrueck

  • White Papers // May 2012

    The Bayesian Spam Filter with NCD

    Undesired e-mail (spam) becomes a big problem nowadays not only for users, but also for Internet providers. One of the main obstacles for elimination of this problem is a complicated security issues. In particular, the very low rate of falsely detected e-mails in practice. The authors tried to eliminate this...

    Provided By University of Osnabrueck

  • White Papers // Apr 2014

    The Design of Multidimensional Data Model Using Principles of the Anchor Data Modeling: An Assessment of Experimental Approach Based on Query Execution Performance

    The decision making processes need to reflect changes in the business world in a multidimensional way. This paper includes also similar way of viewing the data for carrying out key decisions that ensure competitiveness of the business. In this paper, the authors focus on the Business Intelligence system as a...

    Provided By University of Osnabrueck

  • White Papers // Mar 2013

    Data Mining by Symbolic Fuzzy Classifiers and Genetic Programming - State of the Art and Prospective Approaches

    There are various techniques for data mining and data analysis. Data mining is very important in the information retrieval areas especially when the data amounts are very large. Among them, hybrid approaches combining two or more algorithms gain importance as the complexity and dimension of real world data sets grows....

    Provided By University of Osnabrueck

  • White Papers // Feb 2009

    Credit Market Imperfections, Financial Market Regulation And Business Cycles In Eastern Europe

    Credit market imperfections give rise to boom-bust cycle episodes in emerging markets. In the present paper, the authors aim to provide a comprehensive analysis for Eastern Europe. They focus on documenting credit market imperfections, asymmetric financing opportunities across sectors, and business cycle fluctuations at the aggregate and sectoral level. The...

    Provided By University of Osnabrueck