University of Oviedo

Displaying 1-20 of 20 results

  • White Papers // May 2013

    Towards Measuring Resilience in Anonymous Communication Networks

    Most prior work on anonymous communications has focused, to a large extent, on achieving, measuring, and attacking anonymity properties. There are, however, several other properties of importance in anonymous communication networks, such as their performance and their robustness to denial of service attacks that have received less scrutiny. To the...

    Provided By University of Oviedo

  • White Papers // May 2013

    Efficient Probabilistic Parameter Synthesis for Adaptive Systems

    The probabilistic modeling has proved useful to analyze performance, reliability and energy usage of distributed or networked systems. The authors consider parametric probabilistic models, in which probabilities are specified as expressions over a set of parameters, rather than concrete values. They address the parameter synthesis problem for parametric markov decision...

    Provided By University of Oviedo

  • White Papers // Feb 2013

    myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment

    Cloud computing provides an optimal infrastructure to utilize and share both computational and data resources whilst allowing a pay-per-use model, useful to cost-effectively manage hardware investment or to maximize its utilization. Cloud computing also offers transitory access to scalable amounts of computational resources, something that is particularly important due to...

    Provided By University of Oviedo

  • White Papers // Jan 2013

    Defence In-Depth for Cyber Security with Custom Anti-Virus Signature Definition

    Anti-virus software has been the main defence against malicious application and will remain so in the future. However the strength of an anti-virus product will depend on having an updated virus signature and the heuristic engine to detect future and unknown virus. The time gap between an exploit appearing on...

    Provided By University of Oviedo

  • White Papers // Jan 2013

    A Distance-Based Paraconsistent Semantics in DL-Lite

    DL-Lite is an important family of description logics. Recently, there is an increasing interest in handling inconsistency in DL-Lite as the constraint imposed by a TBox can be easily violated by assertions in ABox in DL-Lite. In this paper, the authors present a distance-based paraconsistent semantics based on the notion...

    Provided By University of Oviedo

  • White Papers // Dec 2012

    Deciding Monotone Duality and Identifying Frequent Itemsets in Quadratic Logspace

    As the monotone duality problem is equivalent to a number of problems in the areas of databases, data mining, and knowledge discovery, the results presented here yield new complexity results for those problems, too. For example, it follows from the authors' results that whenever for a Boolean-valued relation (whose attributes...

    Provided By University of Oviedo

  • White Papers // Dec 2012

    Assessing the Bias in Communication Networks Sampled from Twitter

    The authors collect and analyze messages exchanged in Twitter using two of the platform's publicly available APIs (the search and stream specifications). They assess the differences between the two samples, and compare the networks of communication reconstructed from them. The empirical context is given by political protests taking place in...

    Provided By University of Oviedo

  • White Papers // Dec 2012

    Efficient Optical Pumping and High Optical Depth in a Hollow-Core Photonic-Crystal Fibre for a Broadband Quantum Memory

    The generation of large multiphoton quantum states - for applications in computing, metrology, and simulation - requires a network of high-efficiency quantum memories capable of storing broadband pulses. Integrating these memories into a fibre offers a number of advantages towards realising this goal: strong light-matter coupling at low powers, simplified...

    Provided By University of Oviedo

  • White Papers // Oct 2012

    Automatic Energy-Aware Performance Analysis of Mobile Ad-Hoc Networks

    The authors present a framework to automatically evaluate the performance of Mobile Ad-hoc NETworks (MANETs) in terms of different kinds of metrics, such as throughput and energy consumption. They use a probabilistic process calculus to model MANETs; they translate process terms into Markov Decision Processes (MDPs) and use the probabilistic...

    Provided By University of Oviedo

  • White Papers // Oct 2012

    Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication

    The authors investigate whether a classifier can continuously authenticate users based on the way they interact with the touch screen of a smart phone. They propose a set of 30 behavioral touch features that can be extracted from raw touch screen logs and demonstrate that different users populate distinct subspaces...

    Provided By University of Oviedo

  • White Papers // Sep 2012

    Human Interactive Secure ID Management in Body Sensor Networks

    Security and privacy protection for body sensor networks are nontrivial: inadequate protection could lead to the leakage of sensitive personal information and other attacks. Unfortunately, current solutions mainly rely on static and machine-oriented pre-distributed IDs, which have several weaknesses. In order to solve this problem, the authors propose dynamic binding...

    Provided By University of Oviedo

  • White Papers // Jun 2012

    A Practical Man-in-theMiddle Attack on Signal-Based Key Generation Protocols

    Generating secret keys using physical properties of the wireless channel has recently become a popular research area. The main security assumption of these protocols is that a sufficiently distant adversary is unable to guess a generated secret due to the unpredictable behavior of multipath signal propagation. In this paper, the...

    Provided By University of Oviedo

  • White Papers // Apr 2012

    Jpf-Concurrent: An Extension of Java PathFinder for Java.util.concurrent

    One of the main challenges when verifying multithreaded Java applications is the state space explosion problem. Due to thread interleavings, the number of states that the model checker has to verify can grow rapidly and impede the feasibility of verification. In the Java language, the source of thread interleavings can...

    Provided By University of Oviedo

  • White Papers // Mar 2012

    FDB: A Query Engine for Factorised Relational Databases

    Factorized databases are relational databases that use compact factorized representations at the physical layer to re-duce data redundancy and boost query performance. This paper introduces FDB, an in-memory query engine for select-project-join queries on factorized databases. Key components of FDB are novel algorithms for query optimization and evaluation that exploit...

    Provided By University of Oviedo

  • White Papers // Oct 2011

    Trustworthy Middleware Services in the Cloud

    Establishing trust in systems is a difficult problem to tackle. In the Cloud, establishing trust is even more complicated considering its dynamic nature and distributed resources. One of the Cloud's potential features is providing transparent management of resources at Cloud's infrastructure. This would hide technical complexities from Cloud's customers, which...

    Provided By University of Oviedo

  • White Papers // May 2011

    Challenges for Provenance in Cloud Computing

    Cloud computing is an increasingly popular approach for the processing of large data sets and computationally expensive programs. Many applications which require provenance are now moving to cloud infrastructures. However, it is not widely realized that clouds have their own need for provenance due to their dynamic nature and the...

    Provided By University of Oviedo

  • White Papers // Oct 2010

    Test Case Generation for Transition-Pair Coverage Using Scatter Search

    A challenging part of Software Testing entails the generation of test cases, whose costs can be reduced by means of the use of techniques for automating this task. On the other hand, the nature of Software Engineering problems is ideal for the application of metaheuristic techniques. In this paper, the...

    Provided By University of Oviedo

  • White Papers // Jul 2010

    An Assessment of Social Media Business Models and Strategic Implications for Future Implementation

    This paper examines the growth of social media, their usage and value creation with future implications. A review of current social media models and relevant academic literature, supported by interviews with leading social media executives and thought leaders for this paper, shows broad diversity of categories, players and applications. The...

    Provided By University of Oviedo

  • White Papers // Jun 2010

    Performance Loss Between Concept and Keyboard

    Inexpensive multicore processors have brought parallelism to the desktop computer and users would like to take advantage of this parallelism for faster program execution. Standards bodies and commercial software vendors have defined parallel constructs to harness the parallelism in computations. Using the task graph model of parallel program execution, the...

    Provided By University of Oviedo

  • White Papers // Jun 2008

    A Process Semantics for BPMN

    Business Process Modeling Notation (BPMN), developed by the Business Process Management Initiative (BPMI), intends to bridge the gap between business process design and implementation. However, the specification of the notation does not include a formal semantics. This paper shows how a subset of the BPMN can be given process semantics...

    Provided By University of Oviedo

  • White Papers // Jan 2013

    A Distance-Based Paraconsistent Semantics in DL-Lite

    DL-Lite is an important family of description logics. Recently, there is an increasing interest in handling inconsistency in DL-Lite as the constraint imposed by a TBox can be easily violated by assertions in ABox in DL-Lite. In this paper, the authors present a distance-based paraconsistent semantics based on the notion...

    Provided By University of Oviedo

  • White Papers // Oct 2012

    Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication

    The authors investigate whether a classifier can continuously authenticate users based on the way they interact with the touch screen of a smart phone. They propose a set of 30 behavioral touch features that can be extracted from raw touch screen logs and demonstrate that different users populate distinct subspaces...

    Provided By University of Oviedo

  • White Papers // May 2011

    Challenges for Provenance in Cloud Computing

    Cloud computing is an increasingly popular approach for the processing of large data sets and computationally expensive programs. Many applications which require provenance are now moving to cloud infrastructures. However, it is not widely realized that clouds have their own need for provenance due to their dynamic nature and the...

    Provided By University of Oviedo

  • White Papers // Jul 2010

    An Assessment of Social Media Business Models and Strategic Implications for Future Implementation

    This paper examines the growth of social media, their usage and value creation with future implications. A review of current social media models and relevant academic literature, supported by interviews with leading social media executives and thought leaders for this paper, shows broad diversity of categories, players and applications. The...

    Provided By University of Oviedo

  • White Papers // Jun 2008

    A Process Semantics for BPMN

    Business Process Modeling Notation (BPMN), developed by the Business Process Management Initiative (BPMI), intends to bridge the gap between business process design and implementation. However, the specification of the notation does not include a formal semantics. This paper shows how a subset of the BPMN can be given process semantics...

    Provided By University of Oviedo

  • White Papers // Jan 2013

    Defence In-Depth for Cyber Security with Custom Anti-Virus Signature Definition

    Anti-virus software has been the main defence against malicious application and will remain so in the future. However the strength of an anti-virus product will depend on having an updated virus signature and the heuristic engine to detect future and unknown virus. The time gap between an exploit appearing on...

    Provided By University of Oviedo

  • White Papers // Oct 2011

    Trustworthy Middleware Services in the Cloud

    Establishing trust in systems is a difficult problem to tackle. In the Cloud, establishing trust is even more complicated considering its dynamic nature and distributed resources. One of the Cloud's potential features is providing transparent management of resources at Cloud's infrastructure. This would hide technical complexities from Cloud's customers, which...

    Provided By University of Oviedo

  • White Papers // Sep 2012

    Human Interactive Secure ID Management in Body Sensor Networks

    Security and privacy protection for body sensor networks are nontrivial: inadequate protection could lead to the leakage of sensitive personal information and other attacks. Unfortunately, current solutions mainly rely on static and machine-oriented pre-distributed IDs, which have several weaknesses. In order to solve this problem, the authors propose dynamic binding...

    Provided By University of Oviedo

  • White Papers // May 2013

    Towards Measuring Resilience in Anonymous Communication Networks

    Most prior work on anonymous communications has focused, to a large extent, on achieving, measuring, and attacking anonymity properties. There are, however, several other properties of importance in anonymous communication networks, such as their performance and their robustness to denial of service attacks that have received less scrutiny. To the...

    Provided By University of Oviedo

  • White Papers // May 2013

    Efficient Probabilistic Parameter Synthesis for Adaptive Systems

    The probabilistic modeling has proved useful to analyze performance, reliability and energy usage of distributed or networked systems. The authors consider parametric probabilistic models, in which probabilities are specified as expressions over a set of parameters, rather than concrete values. They address the parameter synthesis problem for parametric markov decision...

    Provided By University of Oviedo

  • White Papers // Feb 2013

    myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment

    Cloud computing provides an optimal infrastructure to utilize and share both computational and data resources whilst allowing a pay-per-use model, useful to cost-effectively manage hardware investment or to maximize its utilization. Cloud computing also offers transitory access to scalable amounts of computational resources, something that is particularly important due to...

    Provided By University of Oviedo

  • White Papers // Jun 2010

    Performance Loss Between Concept and Keyboard

    Inexpensive multicore processors have brought parallelism to the desktop computer and users would like to take advantage of this parallelism for faster program execution. Standards bodies and commercial software vendors have defined parallel constructs to harness the parallelism in computations. Using the task graph model of parallel program execution, the...

    Provided By University of Oviedo

  • White Papers // Oct 2010

    Test Case Generation for Transition-Pair Coverage Using Scatter Search

    A challenging part of Software Testing entails the generation of test cases, whose costs can be reduced by means of the use of techniques for automating this task. On the other hand, the nature of Software Engineering problems is ideal for the application of metaheuristic techniques. In this paper, the...

    Provided By University of Oviedo

  • White Papers // Mar 2012

    FDB: A Query Engine for Factorised Relational Databases

    Factorized databases are relational databases that use compact factorized representations at the physical layer to re-duce data redundancy and boost query performance. This paper introduces FDB, an in-memory query engine for select-project-join queries on factorized databases. Key components of FDB are novel algorithms for query optimization and evaluation that exploit...

    Provided By University of Oviedo

  • White Papers // Dec 2012

    Assessing the Bias in Communication Networks Sampled from Twitter

    The authors collect and analyze messages exchanged in Twitter using two of the platform's publicly available APIs (the search and stream specifications). They assess the differences between the two samples, and compare the networks of communication reconstructed from them. The empirical context is given by political protests taking place in...

    Provided By University of Oviedo

  • White Papers // Dec 2012

    Deciding Monotone Duality and Identifying Frequent Itemsets in Quadratic Logspace

    As the monotone duality problem is equivalent to a number of problems in the areas of databases, data mining, and knowledge discovery, the results presented here yield new complexity results for those problems, too. For example, it follows from the authors' results that whenever for a Boolean-valued relation (whose attributes...

    Provided By University of Oviedo

  • White Papers // Apr 2012

    Jpf-Concurrent: An Extension of Java PathFinder for Java.util.concurrent

    One of the main challenges when verifying multithreaded Java applications is the state space explosion problem. Due to thread interleavings, the number of states that the model checker has to verify can grow rapidly and impede the feasibility of verification. In the Java language, the source of thread interleavings can...

    Provided By University of Oviedo

  • White Papers // Dec 2012

    Efficient Optical Pumping and High Optical Depth in a Hollow-Core Photonic-Crystal Fibre for a Broadband Quantum Memory

    The generation of large multiphoton quantum states - for applications in computing, metrology, and simulation - requires a network of high-efficiency quantum memories capable of storing broadband pulses. Integrating these memories into a fibre offers a number of advantages towards realising this goal: strong light-matter coupling at low powers, simplified...

    Provided By University of Oviedo

  • White Papers // Jun 2012

    A Practical Man-in-theMiddle Attack on Signal-Based Key Generation Protocols

    Generating secret keys using physical properties of the wireless channel has recently become a popular research area. The main security assumption of these protocols is that a sufficiently distant adversary is unable to guess a generated secret due to the unpredictable behavior of multipath signal propagation. In this paper, the...

    Provided By University of Oviedo

  • White Papers // Oct 2012

    Automatic Energy-Aware Performance Analysis of Mobile Ad-Hoc Networks

    The authors present a framework to automatically evaluate the performance of Mobile Ad-hoc NETworks (MANETs) in terms of different kinds of metrics, such as throughput and energy consumption. They use a probabilistic process calculus to model MANETs; they translate process terms into Markov Decision Processes (MDPs) and use the probabilistic...

    Provided By University of Oviedo