University of Otago

Displaying 1-40 of 45 results

  • White Papers // Jan 2014

    Supporting Decentralized SPARQL Queries in an Ad-Hoc Semantic Web Data Sharing System

    Sharing the semantic web data encoded in Resource Description Framework (RDF) triples from proprietary datasets scattered around the Internet, calls for efficient support from distributed computing technologies. The highly dynamic ad-hoc settings that would be pervasive for semantic web data sharing among personal users in the future, however, pose even...

    Provided By University of Otago

  • White Papers // Oct 2013

    Performance Modeling of Distributed Collaboration Services with Independent Inputs/Outputs

    In this paper the authors deal with modeling and performance analysis of distributed applications, service compositions and workflow systems. From the functional perspective, the distributed application is modeled as an activity involving several roles, where behavior is defined in terms of compositions from several sub-activities using the standard sequencing operators...

    Provided By University of Otago

  • White Papers // Jun 2013

    Distributed Query Processing in an Ad-Hoc Semantic Web Data Sharing System

    Sharing the semantic web data in proprietary datasets in which data is encoded in Resource Description Framework (RDF) triples in a decentralized environment calls for efficient support from distributed computing technologies. The highly dynamic ad-hoc settings that would be pervasive for semantic web data sharing among personal users in the...

    Provided By University of Otago

  • White Papers // Apr 2013

    Novel Shoulder-Surfing Resistant Haptic-based Graphical Password

    Graphical password schemes are believed to be more secure and more resilient to dictionary attacks than textual passwords, but more vulnerable to shoulder surfing attacks. In this paper, the authors design a new graphical password which is larger in the possible passwords' space than in similar schemes and it is...

    Provided By University of Otago

  • White Papers // Apr 2013

    GDE: General Data Exchange with Schema and Data Level Mappings

    Data Exchange (DE) and data coordination are two important settings that were introduced previously in the literature to resolve the problem of integrating information that resides in different sources. A DE setting moves data residing in independent applications, which refer to the same object using the same name, and accesses...

    Provided By University of Otago

  • White Papers // Dec 2012

    Towards a Hybrid Energy Efficient Multi-Tree-Based Optimized Routing Protocol for Wireless Networks

    This paper considers the problem of designing power efficient routing with guaranteed delivery for sensor networks with unknown geographic locations. The authors propose HECTOR, a hybrid energy efficient tree-based optimized routing protocol, based on two sets of virtual coordinates. One set is based on rooted tree coordinates, and the other...

    Provided By University of Otago

  • White Papers // Nov 2012

    A Novel Collision Probability Based Adaptive Contention Windows Adjustment for QoS Fairness on Ad Hoc Wireless Networks

    It is crucial to achieve Quality of Service (QoS) on IEEE802.11 in order to provide stable and reliable communication for real time and multimedia applications. Most of the recent QoS techniques for Ad Hoc Networks rely on basic QoS classifications such as Enhanced Distributed Channel Access (EDCA) and Hybrid Coordination...

    Provided By University of Otago

  • White Papers // Nov 2012

    A Novel Cross Layer TCP Optimization Protocol Over Wireless Networks by Markov Decision Process

    Transmission Control Protocol (TCP) is well-known for its poor performance over wireless networks. The main reason is the unstable condition of wireless networks. Previous attempts to improve TCP performance have been centered on techniques such as queue management, congestion window adjustment, delayed acknowledgement, and etc., because lower layers are hidden...

    Provided By University of Otago

  • White Papers // Nov 2012

    Distributed Management of Energy-Efficient Lightpaths for Computational Grids

    Information and Communication Technologies (ICTs) are contributing to a large amount of the global electricity consumption. Due to tremendous increase in the bandwidth demands and utilisation of non-renewable energy resources Greenhouse Gas Emissions are increasing proportionally with the increasing demand. Despite their advantages in terms of computing performance, distributed applications...

    Provided By University of Otago

  • White Papers // Oct 2012

    A Strict Hierarchy of Dynamic Graphs for Shortest, Fastest, and Foremost Broadcast

    The notion of highly dynamic networks encompasses many real-world contexts. The need to categorize and understand them led the engineering community to design a variety of mobility models, based on which experiments can be reproduced and solutions fairly compared. The theoretical analogues of mobility models are the logical properties of...

    Provided By University of Otago

  • White Papers // Sep 2012

    Achieving Load Awareness in Position-Based Wireless Ad Hoc Routing

    Wireless ad hoc networks are collections of wireless nodes that are usually battery powered and communicate with each other using radio frequency without a fixed infrastructure or centralised control. They are re-organised to have great potential in a broad range of applications, for example in disaster relief, conference, and battlefield...

    Provided By University of Otago

  • White Papers // Aug 2012

    Energy Efficiency on Location Based Applications in Mobile Cloud Computing: A Survey

    With the emergence of Mobile Cloud Computing (MCC), an increasingly number of applications and services becomes available on mobile devices. In the meantime, the constrained battery power of mobile devices makes a serious impact on user experience. As one increasingly prevalent type of applications in mobile cloud environments, Location Based...

    Provided By University of Otago

  • White Papers // May 2012

    Cooperative Location Verification for Vehicular Ad-Hoc Networks

    Vehicular Ad hoc NETworks (VANETs) have attracted much attention over the last few years. Localization and position information of vehicles is very significant in VANETs; this is a result of the special nature of VANETs. In this paper, the authors propose a location verification approach to prevent position spoofing attacks...

    Provided By University of Otago

  • White Papers // May 2012

    An Efficient QoS MAC for IEEE 802.11p Over Cognitive Multichannel Vehicular Networks

    One of the most challenging issues facing vehicular networks lies in the design of an efficient MAC protocol adaptable to different traffic scenarios (urban and suburban environments). While each environment has its own characteristics leading to different challenges, the merit of this paper lies in developing a MAC protocol suitable...

    Provided By University of Otago

  • White Papers // May 2012

    VIRTUS: A Resilient Location-Aware Video Unicast Scheme for Vehicular Networks

    Video streaming capabilities over Vehicular Ad Hoc NETworks (VANETs) are crucial to the development of interesting and valuable services. However, VANETs are a challenging environment to this kind of communication due to the dispersion and movement of vehicles. In this paper, the authors present a feasible solution to this problem....

    Provided By University of Otago

  • White Papers // May 2012

    Aggregation-Based Discovery for Virtual Network Environments

    Resource discovery aims to assist the Virtual Network Provider (VNP) in selecting the best Infrastructure Provider (InP) which has the best matching resources, for a Virtual Network (VN) request. It provides information about substrate resources that are advertised by InPs. In the current literature, resource discovery focuses mainly on static...

    Provided By University of Otago

  • White Papers // May 2012

    A Comparison of Interference Cartography Generation Techniques in Cognitive Radio Networks

    Interference cartographs can be utilized to determine no-transmit zones and to set the interference-free transmit power for secondary users in cognitive radio networks. This paper provides a performance comparison of common interpolation techniques for generating interference cartographs. The performances of natural-neighbor, thin-plate spline and kriging interpolations are evaluated in terms...

    Provided By University of Otago

  • White Papers // May 2012

    Two-Level Energy-Based Supplier Selection Protocol for Mobile P2P 3D Streaming

    Due to the important developments in the area of wireless networks and mobile computing, P2P networks-based 3D streaming over thin mobile devices is starting to gain the interest of many research works. Nevertheless, one of the main challenges that need to be resolved is the supplying partner selection issue that...

    Provided By University of Otago

  • White Papers // May 2012

    Asymptotic Analysis of Outage Probability in Cognitive Radio Networks

    The aggregate interference distribution in cognitive radio networks is studied in a rigorous analytical way using the popular Poisson point process model. While a number of results are available for this model of regular (non-cognitive) networks, cognitive ones present an extra level of difficulty for the analysis, mainly due to...

    Provided By University of Otago

  • White Papers // May 2012

    Vehicular Movement Patterns: A Prediction-Based Route Discovery Technique for VANETs

    Applications for Vehicular Ad-hoc NETworks (VANETs) have been surfacing every day as with any new network architecture. One of the many challenges that have been addressed is the use of probabilistic models and behavioral patterns to predict routes vehicles undertake in a certain geographical area. This challenge, once overcome, could...

    Provided By University of Otago

  • White Papers // Mar 2012

    Energy-Efficient Battery-Aware MAC Protocol for Wireless Sensor Networks

    Wireless sensor networks suffer from limited power resources. Therefore, managing the energy constraints and exploring new ways to minimize the power consumption during the operation of the nodes are critical issues. Conventional MAC protocols deal with this problem without considering the internal properties of the sensor nodes' batteries. However, recent...

    Provided By University of Otago

  • White Papers // Dec 2011

    SAFEWEB: A Middleware for Securing Ruby-Based Web Applications

    Web applications in many domains such as healthcare and finance must process sensitive data, while complying with legal policies regarding the release of different classes of data to different parties. Currently, software bugs may lead to irreversible disclosure of confidential data in multi-tier web applications. An open challenge is how...

    Provided By University of Otago

  • White Papers // Nov 2011

    A Security Architecture for Data Aggregation and Access Control in Smart Grids

    The authors propose an integrated architecture for smart grids, that supports data aggregation and access control. Data can be aggregated by home area network, building area network and neighboring area network in such a way that the privacy of customers is protected. They use homomorphic encryption technique to achieve this....

    Provided By University of Otago

  • White Papers // Sep 2011

    Transforming Dynamic Behavior Specifications From Activity Diagrams to BPEL

    The Service-Oriented Architecture (SOA) provided by the Web Services standards supports Model-Driven Development; it allows global business process models described in the Business Process Modeling Notation (BPMN) or as UML Activity Diagrams to be transformed into Web Services components specified by WSDL and/or BPEL. The authors have experimented the transformation...

    Provided By University of Otago

  • White Papers // May 2011

    Indicator-Based Policy Compliance of Business Processes

    Business process compliance management has recently grabbed a lot of attention in both business and academia as it helps organizations not only to control and monitor their business processes from a legal point of view but also to avoid financial penalties and undesirable consequences to their reputation. Balancing compliance obligations...

    Provided By University of Otago

  • White Papers // May 2011

    Cloud Computing: The Emperor's New Clothes of IT

    Cloud computing has recently become a hot topic in IT circles. Organizations see it as an opportunity to reduce costs. Outsourcing the provision of data services has become an attractive option in the current climate promising the reduction of staff, equipment, IT operations and associated costs. This paper makes the...

    Provided By University of Otago

  • White Papers // May 2011

    IO Tetris: Deep Storage Consolidation for the Cloud Via Fine-Grained Workload Analysis

    Intelligent workload consolidation in storage systems leads to better Return On Investment (ROI), in terms of more efficient use of data center resources, better Quality of Service (QoS), and lower power consumption. This is particularly significant yet challenging in a cloud environment, in which a large set of different workloads...

    Provided By University of Otago

  • White Papers // Dec 2010

    Regression Test Suite Prioritization Using System Models

    During regression testing, a modified system is often retested using an existing test suite. Since the size of the test suite may be very large, testers are interested in detecting faults in the modified system as early as possible during this retesting process. Test prioritization attempts to order tests for...

    Provided By University of Otago

  • White Papers // Jun 2010

    Modelling The Dynamics Of Business Interaction

    Those companies are embedded in open boundary-less networks and have multiple direct and indirect relationships with a number of other organizations cannot be disputed. Indeed, this has been a long standing proposition of researchers embracing a network view of relationships. The idea of interdependency between companies has been used to...

    Provided By University of Otago

  • White Papers // Jun 2010

    Lightweight Protection Against Brute Force Login Attacks on Web Applications

    Password-based systems and, more generally, authentication systems based on something the user knows, are commonplace on the Internet. Web applications using these systems can be the target of brute force login attacks, in which an attacker tries to compromise a given account or any user account on the system. These...

    Provided By University of Otago

  • White Papers // Nov 2009

    On Distribution of Aggregate Interference in Cognitive Radio Networks

    In this paper, the authors analyze the distribution of aggregate interference in cognitive radio networks. Poisson point spatial distribution model and average propagation path loss model are considered. All possible scenarios are classified into three typical cases, based on typical outage events. When the average number of nodes in the...

    Provided By University of Otago

  • White Papers // Oct 2009

    An Efficient Hybrid Adaptive Location-aided Gateway Advertisement and Discovery Protocol for Heterogeneous Wireless and Mobile Networks

    Recent advances in wireless communications and the availability of Heterogeneous Wireless and Mobile Networks (HWMNs) have enabled the development of interesting applications. The main objective of HWMNs is the delivery of wireless services to potential applications in personal, local, campus and metropolitan areas. However, in these networks, there is a...

    Provided By University of Otago

  • White Papers // Oct 2009

    QUATTRO: QoS-Capable Cross-Layer MAC Protocol for Wireless Sensor Networks

    As the Wireless Sensor Network (WSN) technology evolves towards higher transmission rates, it makes sense to start considering sensing and transmission of real-time information, such as audio and video. These applications require Quality of Service (QoS) guarantees, not offered by current networks. The multi-hop nature of WSN makes QoS a...

    Provided By University of Otago

  • White Papers // Oct 2009

    A Lightweight Iterative Positioning Algorithm for Context-Aware Wireless Sensor Networks: Proof of Correctness

    In this paper, the authors propose an energy-efficient iterative positioning algorithm for Wireless Sensor Networks (WSNs). In the proposed algorithm, localization is achieved in two phases: initial position estimation and iterative refinement. In the initial position estimation phase, instead of flooding the network with beacon messages, they propose to limit...

    Provided By University of Otago

  • White Papers // Sep 2009

    Towards a Measure of Biometric Information

    In the context of biometric fusion one would like to be able to quantify the biometric information in each system individually, and the potential gain from fusing the systems. Additionally, such a measure is relevant to biometric cryptosystems and privacy measures. Several authors have presented approaches relevant to this question....

    Provided By University of Otago

  • White Papers // Aug 2009

    The Growth Delusion

    Concern for the environment and a move towards "Sustainable development" has assisted progress in a wide range of renewable energy technologies in recent years. The science suggests that a transition from fossil fuels to sustainable sources of energy in a time frame commensurate with the demise of the fossil fuels...

    Provided By University of Otago

  • White Papers // Aug 2009

    Business Process Management with the User Requirements Notation

    A number of recent initiatives in both academia and industry have sought to achieve improvements in e-businesses through the utilization of Business Process Management (BPM) methodologies and tools. However there are still some inadequacies that need to be addressed when it comes to achieving alignment between business goals and business...

    Provided By University of Otago

  • White Papers // Jul 2009

    How to Print a Secret

    The authors consider the problem of how to print a human-readable message, or image, on a piece of paper, while simultaneously preventing the participating printing agents or devices from learning its contents. They examine the problem in two set-tings: with a trusted dealer who knows the message, and in a...

    Provided By University of Otago

  • White Papers // May 2009

    A Software Framework for Application Development Using ZigBee Protocol

    The Information Science Discussion Paper Series authored by Bastin Tony Roy Savarimuthu, Morgan Bruce and Maryam Purvis from the Department of Information Science, University of Otago is a well-written documentation on the stronger software framework for application development using ZigBee Protocol. They have strong views on the advent of newer...

    Provided By University of Otago

  • White Papers // Feb 2009

    An Aspect-Oriented Framework for Business Process Improvement

    Recently, many organizations invested in Business Process Management Systems (BPMSs) in order to automate and monitor their processes. Business Activity Monitoring is one of the essential modules of a BPMS as it provides the core monitoring capabilities. Although the natural step after process monitoring is process improvement, most of the...

    Provided By University of Otago

  • White Papers // Sep 2012

    Achieving Load Awareness in Position-Based Wireless Ad Hoc Routing

    Wireless ad hoc networks are collections of wireless nodes that are usually battery powered and communicate with each other using radio frequency without a fixed infrastructure or centralised control. They are re-organised to have great potential in a broad range of applications, for example in disaster relief, conference, and battlefield...

    Provided By University of Otago

  • White Papers // Nov 2012

    A Novel Collision Probability Based Adaptive Contention Windows Adjustment for QoS Fairness on Ad Hoc Wireless Networks

    It is crucial to achieve Quality of Service (QoS) on IEEE802.11 in order to provide stable and reliable communication for real time and multimedia applications. Most of the recent QoS techniques for Ad Hoc Networks rely on basic QoS classifications such as Enhanced Distributed Channel Access (EDCA) and Hybrid Coordination...

    Provided By University of Otago

  • White Papers // Nov 2012

    A Novel Cross Layer TCP Optimization Protocol Over Wireless Networks by Markov Decision Process

    Transmission Control Protocol (TCP) is well-known for its poor performance over wireless networks. The main reason is the unstable condition of wireless networks. Previous attempts to improve TCP performance have been centered on techniques such as queue management, congestion window adjustment, delayed acknowledgement, and etc., because lower layers are hidden...

    Provided By University of Otago

  • White Papers // Nov 2012

    Distributed Management of Energy-Efficient Lightpaths for Computational Grids

    Information and Communication Technologies (ICTs) are contributing to a large amount of the global electricity consumption. Due to tremendous increase in the bandwidth demands and utilisation of non-renewable energy resources Greenhouse Gas Emissions are increasing proportionally with the increasing demand. Despite their advantages in terms of computing performance, distributed applications...

    Provided By University of Otago

  • White Papers // Oct 2009

    An Efficient Hybrid Adaptive Location-aided Gateway Advertisement and Discovery Protocol for Heterogeneous Wireless and Mobile Networks

    Recent advances in wireless communications and the availability of Heterogeneous Wireless and Mobile Networks (HWMNs) have enabled the development of interesting applications. The main objective of HWMNs is the delivery of wireless services to potential applications in personal, local, campus and metropolitan areas. However, in these networks, there is a...

    Provided By University of Otago

  • White Papers // Dec 2012

    Towards a Hybrid Energy Efficient Multi-Tree-Based Optimized Routing Protocol for Wireless Networks

    This paper considers the problem of designing power efficient routing with guaranteed delivery for sensor networks with unknown geographic locations. The authors propose HECTOR, a hybrid energy efficient tree-based optimized routing protocol, based on two sets of virtual coordinates. One set is based on rooted tree coordinates, and the other...

    Provided By University of Otago

  • White Papers // Oct 2009

    QUATTRO: QoS-Capable Cross-Layer MAC Protocol for Wireless Sensor Networks

    As the Wireless Sensor Network (WSN) technology evolves towards higher transmission rates, it makes sense to start considering sensing and transmission of real-time information, such as audio and video. These applications require Quality of Service (QoS) guarantees, not offered by current networks. The multi-hop nature of WSN makes QoS a...

    Provided By University of Otago

  • White Papers // Oct 2009

    A Lightweight Iterative Positioning Algorithm for Context-Aware Wireless Sensor Networks: Proof of Correctness

    In this paper, the authors propose an energy-efficient iterative positioning algorithm for Wireless Sensor Networks (WSNs). In the proposed algorithm, localization is achieved in two phases: initial position estimation and iterative refinement. In the initial position estimation phase, instead of flooding the network with beacon messages, they propose to limit...

    Provided By University of Otago

  • White Papers // Nov 2009

    On Distribution of Aggregate Interference in Cognitive Radio Networks

    In this paper, the authors analyze the distribution of aggregate interference in cognitive radio networks. Poisson point spatial distribution model and average propagation path loss model are considered. All possible scenarios are classified into three typical cases, based on typical outage events. When the average number of nodes in the...

    Provided By University of Otago

  • White Papers // Aug 2012

    Energy Efficiency on Location Based Applications in Mobile Cloud Computing: A Survey

    With the emergence of Mobile Cloud Computing (MCC), an increasingly number of applications and services becomes available on mobile devices. In the meantime, the constrained battery power of mobile devices makes a serious impact on user experience. As one increasingly prevalent type of applications in mobile cloud environments, Location Based...

    Provided By University of Otago

  • White Papers // May 2009

    A Software Framework for Application Development Using ZigBee Protocol

    The Information Science Discussion Paper Series authored by Bastin Tony Roy Savarimuthu, Morgan Bruce and Maryam Purvis from the Department of Information Science, University of Otago is a well-written documentation on the stronger software framework for application development using ZigBee Protocol. They have strong views on the advent of newer...

    Provided By University of Otago

  • White Papers // Jun 2010

    Modelling The Dynamics Of Business Interaction

    Those companies are embedded in open boundary-less networks and have multiple direct and indirect relationships with a number of other organizations cannot be disputed. Indeed, this has been a long standing proposition of researchers embracing a network view of relationships. The idea of interdependency between companies has been used to...

    Provided By University of Otago

  • White Papers // Aug 2009

    The Growth Delusion

    Concern for the environment and a move towards "Sustainable development" has assisted progress in a wide range of renewable energy technologies in recent years. The science suggests that a transition from fossil fuels to sustainable sources of energy in a time frame commensurate with the demise of the fossil fuels...

    Provided By University of Otago

  • White Papers // May 2011

    IO Tetris: Deep Storage Consolidation for the Cloud Via Fine-Grained Workload Analysis

    Intelligent workload consolidation in storage systems leads to better Return On Investment (ROI), in terms of more efficient use of data center resources, better Quality of Service (QoS), and lower power consumption. This is particularly significant yet challenging in a cloud environment, in which a large set of different workloads...

    Provided By University of Otago

  • White Papers // Dec 2011

    SAFEWEB: A Middleware for Securing Ruby-Based Web Applications

    Web applications in many domains such as healthcare and finance must process sensitive data, while complying with legal policies regarding the release of different classes of data to different parties. Currently, software bugs may lead to irreversible disclosure of confidential data in multi-tier web applications. An open challenge is how...

    Provided By University of Otago

  • White Papers // May 2011

    Cloud Computing: The Emperor's New Clothes of IT

    Cloud computing has recently become a hot topic in IT circles. Organizations see it as an opportunity to reduce costs. Outsourcing the provision of data services has become an attractive option in the current climate promising the reduction of staff, equipment, IT operations and associated costs. This paper makes the...

    Provided By University of Otago

  • White Papers // Oct 2012

    A Strict Hierarchy of Dynamic Graphs for Shortest, Fastest, and Foremost Broadcast

    The notion of highly dynamic networks encompasses many real-world contexts. The need to categorize and understand them led the engineering community to design a variety of mobility models, based on which experiments can be reproduced and solutions fairly compared. The theoretical analogues of mobility models are the logical properties of...

    Provided By University of Otago

  • White Papers // Mar 2012

    Energy-Efficient Battery-Aware MAC Protocol for Wireless Sensor Networks

    Wireless sensor networks suffer from limited power resources. Therefore, managing the energy constraints and exploring new ways to minimize the power consumption during the operation of the nodes are critical issues. Conventional MAC protocols deal with this problem without considering the internal properties of the sensor nodes' batteries. However, recent...

    Provided By University of Otago

  • White Papers // Nov 2011

    A Security Architecture for Data Aggregation and Access Control in Smart Grids

    The authors propose an integrated architecture for smart grids, that supports data aggregation and access control. Data can be aggregated by home area network, building area network and neighboring area network in such a way that the privacy of customers is protected. They use homomorphic encryption technique to achieve this....

    Provided By University of Otago

  • White Papers // Jul 2009

    How to Print a Secret

    The authors consider the problem of how to print a human-readable message, or image, on a piece of paper, while simultaneously preventing the participating printing agents or devices from learning its contents. They examine the problem in two set-tings: with a trusted dealer who knows the message, and in a...

    Provided By University of Otago

  • White Papers // Dec 2010

    Regression Test Suite Prioritization Using System Models

    During regression testing, a modified system is often retested using an existing test suite. Since the size of the test suite may be very large, testers are interested in detecting faults in the modified system as early as possible during this retesting process. Test prioritization attempts to order tests for...

    Provided By University of Otago

  • White Papers // May 2012

    Cooperative Location Verification for Vehicular Ad-Hoc Networks

    Vehicular Ad hoc NETworks (VANETs) have attracted much attention over the last few years. Localization and position information of vehicles is very significant in VANETs; this is a result of the special nature of VANETs. In this paper, the authors propose a location verification approach to prevent position spoofing attacks...

    Provided By University of Otago

  • White Papers // May 2012

    An Efficient QoS MAC for IEEE 802.11p Over Cognitive Multichannel Vehicular Networks

    One of the most challenging issues facing vehicular networks lies in the design of an efficient MAC protocol adaptable to different traffic scenarios (urban and suburban environments). While each environment has its own characteristics leading to different challenges, the merit of this paper lies in developing a MAC protocol suitable...

    Provided By University of Otago

  • White Papers // May 2012

    VIRTUS: A Resilient Location-Aware Video Unicast Scheme for Vehicular Networks

    Video streaming capabilities over Vehicular Ad Hoc NETworks (VANETs) are crucial to the development of interesting and valuable services. However, VANETs are a challenging environment to this kind of communication due to the dispersion and movement of vehicles. In this paper, the authors present a feasible solution to this problem....

    Provided By University of Otago

  • White Papers // May 2012

    Aggregation-Based Discovery for Virtual Network Environments

    Resource discovery aims to assist the Virtual Network Provider (VNP) in selecting the best Infrastructure Provider (InP) which has the best matching resources, for a Virtual Network (VN) request. It provides information about substrate resources that are advertised by InPs. In the current literature, resource discovery focuses mainly on static...

    Provided By University of Otago

  • White Papers // May 2012

    A Comparison of Interference Cartography Generation Techniques in Cognitive Radio Networks

    Interference cartographs can be utilized to determine no-transmit zones and to set the interference-free transmit power for secondary users in cognitive radio networks. This paper provides a performance comparison of common interpolation techniques for generating interference cartographs. The performances of natural-neighbor, thin-plate spline and kriging interpolations are evaluated in terms...

    Provided By University of Otago

  • White Papers // May 2012

    Two-Level Energy-Based Supplier Selection Protocol for Mobile P2P 3D Streaming

    Due to the important developments in the area of wireless networks and mobile computing, P2P networks-based 3D streaming over thin mobile devices is starting to gain the interest of many research works. Nevertheless, one of the main challenges that need to be resolved is the supplying partner selection issue that...

    Provided By University of Otago

  • White Papers // May 2012

    Asymptotic Analysis of Outage Probability in Cognitive Radio Networks

    The aggregate interference distribution in cognitive radio networks is studied in a rigorous analytical way using the popular Poisson point process model. While a number of results are available for this model of regular (non-cognitive) networks, cognitive ones present an extra level of difficulty for the analysis, mainly due to...

    Provided By University of Otago

  • White Papers // May 2012

    Vehicular Movement Patterns: A Prediction-Based Route Discovery Technique for VANETs

    Applications for Vehicular Ad-hoc NETworks (VANETs) have been surfacing every day as with any new network architecture. One of the many challenges that have been addressed is the use of probabilistic models and behavioral patterns to predict routes vehicles undertake in a certain geographical area. This challenge, once overcome, could...

    Provided By University of Otago

  • White Papers // Jul 2008

    Detecting and Preventing IP-Spoofed Distributed DoS Attacks

    In this paper, the authors explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks; have become one of the major threats to the operation of the internet today. They propose a novel scheme for detecting and preventing the most harmful and difficult to detect DDoS attacks - those...

    Provided By University of Otago

  • White Papers // Apr 2008

    A Case Study in Integrated Quality Assurance for Performance Management Systems

    On-line enterprise applications that are used by thousands of geographically dispersed users present special challenges for quality assurance. A case study of a hospital performance management system is used to investigate the specific issues of architectural complexity, dynamic change, and access to sensitive data in test environments. A quality assurance...

    Provided By University of Otago

  • White Papers // Oct 2013

    Performance Modeling of Distributed Collaboration Services with Independent Inputs/Outputs

    In this paper the authors deal with modeling and performance analysis of distributed applications, service compositions and workflow systems. From the functional perspective, the distributed application is modeled as an activity involving several roles, where behavior is defined in terms of compositions from several sub-activities using the standard sequencing operators...

    Provided By University of Otago

  • White Papers // Apr 2013

    GDE: General Data Exchange with Schema and Data Level Mappings

    Data Exchange (DE) and data coordination are two important settings that were introduced previously in the literature to resolve the problem of integrating information that resides in different sources. A DE setting moves data residing in independent applications, which refer to the same object using the same name, and accesses...

    Provided By University of Otago

  • White Papers // Jan 2014

    Supporting Decentralized SPARQL Queries in an Ad-Hoc Semantic Web Data Sharing System

    Sharing the semantic web data encoded in Resource Description Framework (RDF) triples from proprietary datasets scattered around the Internet, calls for efficient support from distributed computing technologies. The highly dynamic ad-hoc settings that would be pervasive for semantic web data sharing among personal users in the future, however, pose even...

    Provided By University of Otago

  • White Papers // Jun 2013

    Distributed Query Processing in an Ad-Hoc Semantic Web Data Sharing System

    Sharing the semantic web data in proprietary datasets in which data is encoded in Resource Description Framework (RDF) triples in a decentralized environment calls for efficient support from distributed computing technologies. The highly dynamic ad-hoc settings that would be pervasive for semantic web data sharing among personal users in the...

    Provided By University of Otago

  • White Papers // Apr 2013

    Novel Shoulder-Surfing Resistant Haptic-based Graphical Password

    Graphical password schemes are believed to be more secure and more resilient to dictionary attacks than textual passwords, but more vulnerable to shoulder surfing attacks. In this paper, the authors design a new graphical password which is larger in the possible passwords' space than in similar schemes and it is...

    Provided By University of Otago

  • White Papers // Dec 2006

    Haptic-Based Sensible Graphical Password

    Authentication, the process of identifying an individual, currently plays a critical role in security systems. Graphical password schemes are believed to be more secure and resilient to dictionary attacks than traditional textual passwords. The authors designed a graphical password system with the novelty of incorporating the sense of touch via...

    Provided By University of Otago

  • White Papers // Sep 2009

    Towards a Measure of Biometric Information

    In the context of biometric fusion one would like to be able to quantify the biometric information in each system individually, and the potential gain from fusing the systems. Additionally, such a measure is relevant to biometric cryptosystems and privacy measures. Several authors have presented approaches relevant to this question....

    Provided By University of Otago

  • White Papers // Jun 2010

    Lightweight Protection Against Brute Force Login Attacks on Web Applications

    Password-based systems and, more generally, authentication systems based on something the user knows, are commonplace on the Internet. Web applications using these systems can be the target of brute force login attacks, in which an attacker tries to compromise a given account or any user account on the system. These...

    Provided By University of Otago

  • White Papers // Aug 2009

    Business Process Management with the User Requirements Notation

    A number of recent initiatives in both academia and industry have sought to achieve improvements in e-businesses through the utilization of Business Process Management (BPM) methodologies and tools. However there are still some inadequacies that need to be addressed when it comes to achieving alignment between business goals and business...

    Provided By University of Otago