University of Passau

Displaying 1-38 of 38 results

  • White Papers // Oct 2013

    Architecture and Implementation of an Adaptive Nanopositioning Controller for Fast Spiral Scanning

    Nanopositioning is a key factor for a wide range of applications, such as surface imaging and ultra-high-density probe-based data storage. These applications use scanning probes in order to sense and alter the properties of the underlying medium with nanoscale precision. Recently, new scanning schemes were introduced that can lead to...

    Provided By University of Passau

  • White Papers // Oct 2013

    Correlated Noise Estimation and Error Correction in Parallel Storage Channels

    The evolution of new technologies frequently results to the need of formulating old problems in new way. The design of MEMS-based storage systems that use multiple, simultaneously accessed channels, has to confront, among others, the problem of correlated noise in different channels. This work presents a method that exploits the...

    Provided By University of Passau

  • White Papers // May 2013

    Modeling of Readback Signal Generated by Scanning PCM Surfaces

    Micro-Electro-Mechanical Systems (MEMS) based on Scanning Probe Methods (SPM) are an emerging technology for sensor based applications and data storage. Atomic Force Microscope (AFM) techniques with conductive tips, using phase change materials to record data as amorphous or crystalline marks, have been demonstrated experimentally. Storing data patterns on the Phase...

    Provided By University of Passau

  • White Papers // Apr 2013

    LTE/SAE Security Issues on 4G Wireless Networks

    The recent expansion of wireless network technologies and the emergence of novel applications such as mobile TV, Web 2.0, and streaming content have led to the standardization of the (pre-4G) Long-Term Evolution (LTE) protocol to become operational with the 3rd Generation Partnership Project (3GPP). The 3GPP has also begun the...

    Provided By University of Passau

  • White Papers // Aug 2012

    Evaluating Model for e-Learning Modules According to Selected Criteria: An Object Oriented Approach

    This paper aims at developing an applied system to evaluate the e-Learning Modules (eLMs) depending on selected related criteria. Those criteria concern with many fields as well as many factors like, learning theories, computer science, instructional computer, software engineering, educational sciences, language criteria, economical factors, etc. Therefore the authors expressed...

    Provided By University of Passau

  • White Papers // Jul 2012

    A Cross-Layer Design for Video Transmission With TFRC in MANETs

    Mobile Ad hoc NETworks (MANETs) are becoming more essential to wireless communications due to growing popularity of mobile devices. However, MANETs do not seem to effectively support multimedia applications and especially video transmission. In this paper, the authors propose a cross-layer design that aims to improve the performance of video...

    Provided By University of Passau

  • White Papers // May 2012

    QoS Guarantee in a Batched Poisson Multirate Loss Model Supporting Elastic and Adaptive Traffic

    In this paper, the authors consider a single link that supports both elastic and adaptive traffic of Batch Poisson arriving calls, under the Bandwidth Reservation (BR) policy, whereby they can achieve specific QoS per service-class. Arriving batches have a generally distributed batch size, and can be serviced either as a...

    Provided By University of Passau

  • White Papers // Apr 2012

    Do Background Colors Improve Program Comprehension in the #ifdef Hell?

    Software-product-line engineering aims at the development of variable and reusable software systems. In practice, software product lines are often implemented with preprocessors. Preprocessor directives are easy to use, and many mature tools are available for practitioners. However, preprocessor directives have been heavily criticized in academia and even referred to as...

    Provided By University of Passau

  • White Papers // Mar 2012

    A Low-Complexity Resource Allocation Algorithm for OFDMA-Based Cellular Networks With QoS Provisioning: A Cross-Layer Design Approach

    In this paper, the authors focus on a low complexity resource allocation algorithm in order to provide certain levels of Quality of Service (QoS) to users in the downlink of a cellular Orthogonal Frequency Division Multiple Access (OFDMA) based network. The proposed solution adopts a cross-layer design, while it is...

    Provided By University of Passau

  • White Papers // Feb 2012

    Optical Switching for Dynamic Distribution of Wireless-over-Fiber Signals

    In this paper, the authors report on an experimental validation of dynamic distribution of wireless-over-fiber by employing optical switching using semiconductor optical amplifiers; the rest of the network was designed according to the channel distribution over the optical spectra required by the optical switch. An experimental validation was also conducted....

    Provided By University of Passau

  • White Papers // Nov 2011

    Language-Independent and Automated Software Composition: The FEATUREHOUSE Experience

    Superimposition is a composition technique that has been applied successfully in many areas of software development. Although superimposition is a general-purpose concept, it has been (re)invented and implemented individually for various kinds of software artifacts. The authors unify languages and tools that rely on superimposition by using the language-independent model...

    Provided By University of Passau

  • White Papers // Sep 2011

    Feature-Aware Verification

    A software product line is a set of software products that are distinguished in terms of features (i.e., end-user - visible units of behavior). Feature interactions - situations in which the combination of features leads to emergent and possibly critical behavior - are a major source of failures in software...

    Provided By University of Passau

  • White Papers // Sep 2011

    Conditional Model Checking

    Software model checking, as an undecidable problem, has three possible outcomes: the program satisfies the specification, the program does not satisfy the specification, and the model checker fails. The third outcome usually manifests itself in a space-out, time-out, or one component of the verification tool giving up; in all of...

    Provided By University of Passau

  • White Papers // Jul 2011

    Power Management for SVC Video Over Wireless Networks

    This paper is to study how the emerging H.264 SVC standard can be utilized for more efficient power management in wireless video transmissions. The authors' proposal uses a cross-layer approach which adapts the power transmission level of the sender according to the SVC information regarding the priority of the SVC...

    Provided By University of Passau

  • White Papers // Mar 2011

    Energy-Efficient Wireless Mesh Infrastructures

    The Internet comprises access segments with wired and wireless technologies. In the future, one can expect Wireless Mesh Infrastructures (WMIs) to proliferate in this paper. Due to the relatively low energy efficiency of wireless transmission, as compared to wired transmission, energy consumption of WMIs can represent a significant part of...

    Provided By University of Passau

  • White Papers // Feb 2011

    Tracking Accuracy and Stability of a Sliding Peak-Filter Based Controller for Spiral Nanopositioning in Probe Storage Systems

    High precision nanopositioning is a crucial function of high-density probe-based storage devices and its performance affects determinatively the device's reliability. The use of non-conventional nanopositioning schemes for achieving much higher data rates imposes new requirements on the control algorithms. In this paper, the authors analyze in terms of accuracy and...

    Provided By University of Passau

  • White Papers // Feb 2011

    Virtualization of 802.11 Interfaces for Wireless Mesh Networks

    Equipping wireless devices with multiple radio interfaces enables multi-channel communication that has attracted recent interest due to its significant benefits in terms of exploiting the available radios to increase the throughput and the creation of WLAN-based Mesh Networks. The usage of multiple Network Interface Cards (NICs) demands higher cost, large...

    Provided By University of Passau

  • White Papers // Dec 2010

    Emergent Behaviour in Collaborative Indoor Localisation: An Example of Self-Organisation in Ubiquitous Sensing Systems

    The authors investigate emergent effects in collaborative indoor localisation as an example of self-organisation in ubiquitous sensing systems. They consider Pedestrian Dead Reckoning (PDR) systems that collaborate to improve their location estimate when two users are detected to be close to each other. In a simulation based on empirically determined...

    Provided By University of Passau

  • White Papers // Aug 2010

    Towards Automated Processing of the Right of Access in Inter-Organizational Web Service Compositions

    Enforcing the right of access to personal data usually is a long-running process between a data subject and an organization that processes personal data. As of today, this task is commonly realized using a manual process based on postal communication or personal attendance and ends up conflicting with trade secret...

    Provided By University of Passau

  • White Papers // Jul 2010

    Side Channel Attacks Cryptanalysis Againt Block Ciphers Based on FPGA Devices

    The block cipher designers assume that the secret information will be manipulated in close and reliable computing environments. Unfortunately, this isn't feasible because actual computing units and chips have implementation information leakage during their operation. Side channel cryptanalysis exploits this implementation data, in order to extract cipher's secret information. In...

    Provided By University of Passau

  • White Papers // Apr 2010

    Detection of Web Denial-of-Service Attacks Using Decoy Hyperlinks

    In this paper a method for detecting denial-of-service attacks in Web sites is presented. The detection of Web attacks are distinguished from normal user patterns by inserting decoy hyperlinks into some key pages in the Website. Typical types of decoy hyperlinks are described and experimental results derived from real Web-sites...

    Provided By University of Passau

  • White Papers // Feb 2010

    Type Safety for Feature-Oriented Product Lines

    A feature-oriented product line is a family of programs that share a common set of features. A feature implements a stakeholder's requirement and represents a design decision or configuration option. When added to a program, a feature involves the introduction of new structures, such as classes and methods, and the...

    Provided By University of Passau

  • White Papers // Jan 2010

    Integrating Keyword Search Into XML Query Processing

    Due to the popularity of the XML data format, several query languages for XML have been proposed, specially devised to handle data whose structure is unknown, loose, or absent. While these languages are rich enough to allow for querying the content and structure of an XML document, a varying or...

    Provided By University of Passau

  • White Papers // Dec 2009

    Organizational Forms Based on Information & Communication Technologies (ICTs) Adoption

    Based on previous research that classified the Information and Communication Technologies (ICTs) into five categories, this paper examines empirically the new organizational forms which are coming from the use of every different ICT. Specifically, this paper presents the organizational categorization of Small and Medium sized Enterprises (SMEs) in accordance with...

    Provided By University of Passau

  • White Papers // Sep 2009

    SIVA Producer - A Modular Authoring System for Interactive Videos

    In this paper a modular authoring system for interactive videos is introduced. The system enables the author to edit the video and add annotations like images, text, hyperlinks to defined scenes or the whole video. It provides a video cutting tool to define scenes, a scene graph to realize non-linear...

    Provided By University of Passau

  • White Papers // Aug 2009

    Simulation in the Expansion of SMEs Through the Adoption of Icts an Empirical Study of Smes in Greece

    One of the main factors that influences the success or failure of SMEs is technology. The continuous rise in the use of ICTs, as well as their importance for the modern enterprise, is presented in the study conducted by OECD. More specifically, it mentions that SMEs have gradually recognized the...

    Provided By University of Passau

  • White Papers // Aug 2009

    Simulation in the Expansion of SMEs Through the Adoption of ICTs. an Empirical Study of SMEs in Greece

    One of the main factors that influences the success or failure of SMEs is technology. The continuous rise in the use of ICTs, as well as their importance for the modern enterprise, is presented in the study conducted by OECD. Bootstrap and jackknife resampling methods are used to determine to...

    Provided By University of Passau

  • White Papers // Jun 2009

    Introduction of an MPEG-7 Query Language

    Today the availability of digital media content is well established and widespread. Not only commercial content distribution is a big market, but also user driven digital multimedia content is produced and shared in big communities. One of the metadata standards that has been established to describe multimedia content via metadata...

    Provided By University of Passau

  • White Papers // Jun 2009

    Type-Safe Feature-Oriented Product Lines

    A feature-oriented product line is a family of programs that share a common set of features. A feature implements a stakeholder's requirement, represents a design decision and configuration option and, when added to a program, involves the introduction of new structures, such as classes and methods, and the refinement of...

    Provided By University of Passau

  • White Papers // Apr 2009

    Feature (De)composition in Functional Programming

    The separation of concerns is a fundamental principle in software engineering. Crosscutting concerns are concerns that do not align with hierarchical and block decomposition supported by mainstream programming languages. In the past, crosscutting concerns have been studied mainly in the context of object orientation. Feature orientation is a novel programming...

    Provided By University of Passau

  • White Papers // Mar 2009

    Modeling the Dynamics of MEMS-based Mobile Devices under Speed-controlled Human Motion Using Acceleration Measurements

    In this paper, the authors focus on modeling the dynamics of MEMS-based mobile devices, when are subject to speed-controlled human motion, using measurements from accelerometers mounted on the device's frame. The measurement procedure and used data acquisition setup, indicative measurements showing the effect of physical system characteristics on the resulting...

    Provided By University of Passau

  • White Papers // Feb 2009

    FeatureIDE: A Tool Framework for Feature-Oriented Software Development

    Tools support is crucial for the acceptance of a new programming language. However, providing such tool support is a huge investment that can usually not be provided for a research language. With FeatureIDE, the authors have built an IDE for AHEAD that integrates all phases of feature-oriented software development. To...

    Provided By University of Passau

  • White Papers // Feb 2009

    FEATUREHOUSE: Language-Independent, Automated Software Composition

    Superimposition is a composition technique that has been applied successfully in many areas of software development. Although superimposition is a general-purpose concept, it has been (re)invented and implemented individually for various kinds of software artifacts. The authors unify languages and tools that rely on superimposition by using the language-independent model...

    Provided By University of Passau

  • White Papers // Oct 2008

    Virtualized Networks Based on System Virtualization

    System virtualization is used to virtualize physical hardware, called Real Machine (RM) in this context. A Virtual Machine Monitor (VMM) runs on top of the RM and virtualizes its resources by providing Virtual Machines (VMs). A VM consists of virtual CPUs, virtual memory, virtual hard disks, virtual network interface cards,...

    Provided By University of Passau

  • White Papers // Aug 2008

    Standardized Multimedia Retrieval Based on Web Service Technologies and the MPEG Query Format

    In recent years, the growing number of digital audiovisual media files available over the internet or even on users hard discs is overwhelming. In order to support efficient storage and retrieval of those data, several comprehensive and rich MultiMedia Retrieval Systems (MMRS) have been introduced. Unfortunately, a standardized query format...

    Provided By University of Passau

  • White Papers // Dec 2007

    SecurID Authenticator: On the Hardware Implementation Efficiency

    SecurID tokens have been developed by SDTI/RSA Security to authenticate users to a corporate network infrastructure. Although, thus authorization approach could be efficiently applied to modern networks such as wireless and mobile. In this work, two different architectures and their integrations on silicon are proposed for SecurID Authenticator. Both proposed...

    Provided By University of Passau

  • White Papers // Aug 2007

    AAA and Mobile Networks: Security Aspects and Architectural Efficiency

    Security is a crucial factor in the provision of the network services, in both wireless and wired communications. Day-by-day, the number of subscribers is increased by an exponential function. Furthermore, the continued growth of network services, in addition to the available networks resources each time caused special needs for security...

    Provided By University of Passau

  • White Papers // Apr 2006

    Area-Optimized Architectures & Implementation of PELICAN MAC Function

    With the advance of both information technology and data communications, security and privacy have been widely used in more area than ever. Security has become a crucial issue in both communication systems and networks. PELICAN is a latest developed MAC function based on RIJNDAEL encryption algorithm. In this work two...

    Provided By University of Passau

  • White Papers // Dec 2010

    Emergent Behaviour in Collaborative Indoor Localisation: An Example of Self-Organisation in Ubiquitous Sensing Systems

    The authors investigate emergent effects in collaborative indoor localisation as an example of self-organisation in ubiquitous sensing systems. They consider Pedestrian Dead Reckoning (PDR) systems that collaborate to improve their location estimate when two users are detected to be close to each other. In a simulation based on empirically determined...

    Provided By University of Passau

  • White Papers // Mar 2011

    Energy-Efficient Wireless Mesh Infrastructures

    The Internet comprises access segments with wired and wireless technologies. In the future, one can expect Wireless Mesh Infrastructures (WMIs) to proliferate in this paper. Due to the relatively low energy efficiency of wireless transmission, as compared to wired transmission, energy consumption of WMIs can represent a significant part of...

    Provided By University of Passau

  • White Papers // Feb 2011

    Virtualization of 802.11 Interfaces for Wireless Mesh Networks

    Equipping wireless devices with multiple radio interfaces enables multi-channel communication that has attracted recent interest due to its significant benefits in terms of exploiting the available radios to increase the throughput and the creation of WLAN-based Mesh Networks. The usage of multiple Network Interface Cards (NICs) demands higher cost, large...

    Provided By University of Passau

  • White Papers // Nov 2011

    Language-Independent and Automated Software Composition: The FEATUREHOUSE Experience

    Superimposition is a composition technique that has been applied successfully in many areas of software development. Although superimposition is a general-purpose concept, it has been (re)invented and implemented individually for various kinds of software artifacts. The authors unify languages and tools that rely on superimposition by using the language-independent model...

    Provided By University of Passau

  • White Papers // Aug 2010

    Towards Automated Processing of the Right of Access in Inter-Organizational Web Service Compositions

    Enforcing the right of access to personal data usually is a long-running process between a data subject and an organization that processes personal data. As of today, this task is commonly realized using a manual process based on postal communication or personal attendance and ends up conflicting with trade secret...

    Provided By University of Passau

  • White Papers // Sep 2011

    Feature-Aware Verification

    A software product line is a set of software products that are distinguished in terms of features (i.e., end-user - visible units of behavior). Feature interactions - situations in which the combination of features leads to emergent and possibly critical behavior - are a major source of failures in software...

    Provided By University of Passau

  • White Papers // Sep 2011

    Conditional Model Checking

    Software model checking, as an undecidable problem, has three possible outcomes: the program satisfies the specification, the program does not satisfy the specification, and the model checker fails. The third outcome usually manifests itself in a space-out, time-out, or one component of the verification tool giving up; in all of...

    Provided By University of Passau

  • White Papers // Apr 2012

    Do Background Colors Improve Program Comprehension in the #ifdef Hell?

    Software-product-line engineering aims at the development of variable and reusable software systems. In practice, software product lines are often implemented with preprocessors. Preprocessor directives are easy to use, and many mature tools are available for practitioners. However, preprocessor directives have been heavily criticized in academia and even referred to as...

    Provided By University of Passau

  • White Papers // Feb 2010

    Type Safety for Feature-Oriented Product Lines

    A feature-oriented product line is a family of programs that share a common set of features. A feature implements a stakeholder's requirement and represents a design decision or configuration option. When added to a program, a feature involves the introduction of new structures, such as classes and methods, and the...

    Provided By University of Passau

  • White Papers // Apr 2009

    Feature (De)composition in Functional Programming

    The separation of concerns is a fundamental principle in software engineering. Crosscutting concerns are concerns that do not align with hierarchical and block decomposition supported by mainstream programming languages. In the past, crosscutting concerns have been studied mainly in the context of object orientation. Feature orientation is a novel programming...

    Provided By University of Passau

  • White Papers // Jun 2009

    Type-Safe Feature-Oriented Product Lines

    A feature-oriented product line is a family of programs that share a common set of features. A feature implements a stakeholder's requirement, represents a design decision and configuration option and, when added to a program, involves the introduction of new structures, such as classes and methods, and the refinement of...

    Provided By University of Passau

  • White Papers // Jul 2012

    A Cross-Layer Design for Video Transmission With TFRC in MANETs

    Mobile Ad hoc NETworks (MANETs) are becoming more essential to wireless communications due to growing popularity of mobile devices. However, MANETs do not seem to effectively support multimedia applications and especially video transmission. In this paper, the authors propose a cross-layer design that aims to improve the performance of video...

    Provided By University of Passau

  • White Papers // Jul 2011

    Power Management for SVC Video Over Wireless Networks

    This paper is to study how the emerging H.264 SVC standard can be utilized for more efficient power management in wireless video transmissions. The authors' proposal uses a cross-layer approach which adapts the power transmission level of the sender according to the SVC information regarding the priority of the SVC...

    Provided By University of Passau

  • White Papers // Aug 2012

    Evaluating Model for e-Learning Modules According to Selected Criteria: An Object Oriented Approach

    This paper aims at developing an applied system to evaluate the e-Learning Modules (eLMs) depending on selected related criteria. Those criteria concern with many fields as well as many factors like, learning theories, computer science, instructional computer, software engineering, educational sciences, language criteria, economical factors, etc. Therefore the authors expressed...

    Provided By University of Passau

  • White Papers // May 2012

    QoS Guarantee in a Batched Poisson Multirate Loss Model Supporting Elastic and Adaptive Traffic

    In this paper, the authors consider a single link that supports both elastic and adaptive traffic of Batch Poisson arriving calls, under the Bandwidth Reservation (BR) policy, whereby they can achieve specific QoS per service-class. Arriving batches have a generally distributed batch size, and can be serviced either as a...

    Provided By University of Passau

  • White Papers // Mar 2012

    A Low-Complexity Resource Allocation Algorithm for OFDMA-Based Cellular Networks With QoS Provisioning: A Cross-Layer Design Approach

    In this paper, the authors focus on a low complexity resource allocation algorithm in order to provide certain levels of Quality of Service (QoS) to users in the downlink of a cellular Orthogonal Frequency Division Multiple Access (OFDMA) based network. The proposed solution adopts a cross-layer design, while it is...

    Provided By University of Passau

  • White Papers // Dec 2009

    Organizational Forms Based on Information & Communication Technologies (ICTs) Adoption

    Based on previous research that classified the Information and Communication Technologies (ICTs) into five categories, this paper examines empirically the new organizational forms which are coming from the use of every different ICT. Specifically, this paper presents the organizational categorization of Small and Medium sized Enterprises (SMEs) in accordance with...

    Provided By University of Passau

  • White Papers // Aug 2009

    Simulation in the Expansion of SMEs Through the Adoption of ICTs. an Empirical Study of SMEs in Greece

    One of the main factors that influences the success or failure of SMEs is technology. The continuous rise in the use of ICTs, as well as their importance for the modern enterprise, is presented in the study conducted by OECD. Bootstrap and jackknife resampling methods are used to determine to...

    Provided By University of Passau

  • White Papers // Apr 2013

    LTE/SAE Security Issues on 4G Wireless Networks

    The recent expansion of wireless network technologies and the emergence of novel applications such as mobile TV, Web 2.0, and streaming content have led to the standardization of the (pre-4G) Long-Term Evolution (LTE) protocol to become operational with the 3rd Generation Partnership Project (3GPP). The 3GPP has also begun the...

    Provided By University of Passau

  • White Papers // Apr 2010

    Detection of Web Denial-of-Service Attacks Using Decoy Hyperlinks

    In this paper a method for detecting denial-of-service attacks in Web sites is presented. The detection of Web attacks are distinguished from normal user patterns by inserting decoy hyperlinks into some key pages in the Website. Typical types of decoy hyperlinks are described and experimental results derived from real Web-sites...

    Provided By University of Passau

  • White Papers // Jul 2010

    Side Channel Attacks Cryptanalysis Againt Block Ciphers Based on FPGA Devices

    The block cipher designers assume that the secret information will be manipulated in close and reliable computing environments. Unfortunately, this isn't feasible because actual computing units and chips have implementation information leakage during their operation. Side channel cryptanalysis exploits this implementation data, in order to extract cipher's secret information. In...

    Provided By University of Passau

  • White Papers // Dec 2007

    SecurID Authenticator: On the Hardware Implementation Efficiency

    SecurID tokens have been developed by SDTI/RSA Security to authenticate users to a corporate network infrastructure. Although, thus authorization approach could be efficiently applied to modern networks such as wireless and mobile. In this work, two different architectures and their integrations on silicon are proposed for SecurID Authenticator. Both proposed...

    Provided By University of Passau

  • White Papers // Aug 2007

    AAA and Mobile Networks: Security Aspects and Architectural Efficiency

    Security is a crucial factor in the provision of the network services, in both wireless and wired communications. Day-by-day, the number of subscribers is increased by an exponential function. Furthermore, the continued growth of network services, in addition to the available networks resources each time caused special needs for security...

    Provided By University of Passau

  • White Papers // Apr 2006

    Area-Optimized Architectures & Implementation of PELICAN MAC Function

    With the advance of both information technology and data communications, security and privacy have been widely used in more area than ever. Security has become a crucial issue in both communication systems and networks. PELICAN is a latest developed MAC function based on RIJNDAEL encryption algorithm. In this work two...

    Provided By University of Passau

  • White Papers // Oct 2013

    Architecture and Implementation of an Adaptive Nanopositioning Controller for Fast Spiral Scanning

    Nanopositioning is a key factor for a wide range of applications, such as surface imaging and ultra-high-density probe-based data storage. These applications use scanning probes in order to sense and alter the properties of the underlying medium with nanoscale precision. Recently, new scanning schemes were introduced that can lead to...

    Provided By University of Passau

  • White Papers // Oct 2013

    Correlated Noise Estimation and Error Correction in Parallel Storage Channels

    The evolution of new technologies frequently results to the need of formulating old problems in new way. The design of MEMS-based storage systems that use multiple, simultaneously accessed channels, has to confront, among others, the problem of correlated noise in different channels. This work presents a method that exploits the...

    Provided By University of Passau

  • White Papers // May 2013

    Modeling of Readback Signal Generated by Scanning PCM Surfaces

    Micro-Electro-Mechanical Systems (MEMS) based on Scanning Probe Methods (SPM) are an emerging technology for sensor based applications and data storage. Atomic Force Microscope (AFM) techniques with conductive tips, using phase change materials to record data as amorphous or crystalline marks, have been demonstrated experimentally. Storing data patterns on the Phase...

    Provided By University of Passau

  • White Papers // Feb 2011

    Tracking Accuracy and Stability of a Sliding Peak-Filter Based Controller for Spiral Nanopositioning in Probe Storage Systems

    High precision nanopositioning is a crucial function of high-density probe-based storage devices and its performance affects determinatively the device's reliability. The use of non-conventional nanopositioning schemes for achieving much higher data rates imposes new requirements on the control algorithms. In this paper, the authors analyze in terms of accuracy and...

    Provided By University of Passau

  • White Papers // Mar 2009

    Modeling the Dynamics of MEMS-based Mobile Devices under Speed-controlled Human Motion Using Acceleration Measurements

    In this paper, the authors focus on modeling the dynamics of MEMS-based mobile devices, when are subject to speed-controlled human motion, using measurements from accelerometers mounted on the device's frame. The measurement procedure and used data acquisition setup, indicative measurements showing the effect of physical system characteristics on the resulting...

    Provided By University of Passau

  • White Papers // Sep 2009

    SIVA Producer - A Modular Authoring System for Interactive Videos

    In this paper a modular authoring system for interactive videos is introduced. The system enables the author to edit the video and add annotations like images, text, hyperlinks to defined scenes or the whole video. It provides a video cutting tool to define scenes, a scene graph to realize non-linear...

    Provided By University of Passau

  • White Papers // Jan 2010

    Integrating Keyword Search Into XML Query Processing

    Due to the popularity of the XML data format, several query languages for XML have been proposed, specially devised to handle data whose structure is unknown, loose, or absent. While these languages are rich enough to allow for querying the content and structure of an XML document, a varying or...

    Provided By University of Passau

  • White Papers // Oct 2008

    Virtualized Networks Based on System Virtualization

    System virtualization is used to virtualize physical hardware, called Real Machine (RM) in this context. A Virtual Machine Monitor (VMM) runs on top of the RM and virtualizes its resources by providing Virtual Machines (VMs). A VM consists of virtual CPUs, virtual memory, virtual hard disks, virtual network interface cards,...

    Provided By University of Passau

  • White Papers // Aug 2008

    Standardized Multimedia Retrieval Based on Web Service Technologies and the MPEG Query Format

    In recent years, the growing number of digital audiovisual media files available over the internet or even on users hard discs is overwhelming. In order to support efficient storage and retrieval of those data, several comprehensive and rich MultiMedia Retrieval Systems (MMRS) have been introduced. Unfortunately, a standardized query format...

    Provided By University of Passau

  • White Papers // Jun 2009

    Introduction of an MPEG-7 Query Language

    Today the availability of digital media content is well established and widespread. Not only commercial content distribution is a big market, but also user driven digital multimedia content is produced and shared in big communities. One of the metadata standards that has been established to describe multimedia content via metadata...

    Provided By University of Passau

  • White Papers // Feb 2009

    FeatureIDE: A Tool Framework for Feature-Oriented Software Development

    Tools support is crucial for the acceptance of a new programming language. However, providing such tool support is a huge investment that can usually not be provided for a research language. With FeatureIDE, the authors have built an IDE for AHEAD that integrates all phases of feature-oriented software development. To...

    Provided By University of Passau

  • White Papers // Feb 2009

    FEATUREHOUSE: Language-Independent, Automated Software Composition

    Superimposition is a composition technique that has been applied successfully in many areas of software development. Although superimposition is a general-purpose concept, it has been (re)invented and implemented individually for various kinds of software artifacts. The authors unify languages and tools that rely on superimposition by using the language-independent model...

    Provided By University of Passau

  • White Papers // Feb 2012

    Optical Switching for Dynamic Distribution of Wireless-over-Fiber Signals

    In this paper, the authors report on an experimental validation of dynamic distribution of wireless-over-fiber by employing optical switching using semiconductor optical amplifiers; the rest of the network was designed according to the channel distribution over the optical spectra required by the optical switch. An experimental validation was also conducted....

    Provided By University of Passau

  • White Papers // Aug 2009

    Simulation in the Expansion of SMEs Through the Adoption of Icts an Empirical Study of Smes in Greece

    One of the main factors that influences the success or failure of SMEs is technology. The continuous rise in the use of ICTs, as well as their importance for the modern enterprise, is presented in the study conducted by OECD. More specifically, it mentions that SMEs have gradually recognized the...

    Provided By University of Passau