University of Piraeus

Displaying 1-25 of 25 results

  • White Papers // Jun 2013

    STaR: A Reconfigurable and Transparent Middleware for WSNs Security

    Wireless Sensor Networks (WSNs) are prone to security at-tacks. In order to protect the network from potential adversaries, it is necessary to secure communications between sensor nodes. Also, if the authors consider a network of heterogeneous objects including WSNs, security requirements may be far more complex. In particular, a single...

    Provided By University of Piraeus

  • White Papers // May 2013

    Integrating Autonomic Grid Components and Process-Driven Business Applications

    Today's business applications are increasingly process driven, meaning that the main application logic is executed by a dedicate process engine. In addition, component-oriented software development has been attracting attention for building complex distributed applications. In this paper, the authors present the experiences gained from building a process-driven biometric identification application...

    Provided By University of Piraeus

  • White Papers // Feb 2013

    Improving the Utilization of an Elastic Resource: A Client-Side Approach

    Resource management is traditionally addressed by policies implemented inside the resource provider. Here the authors study the problem with an attitude that is specular but complementary, which consists in designing a distributed client-side access regulation algorithm that improves the utilization of an elastic resource. The introduction of elastic resources -...

    Provided By University of Piraeus

  • White Papers // Nov 2012

    An Open Hardware Implementation of CUSUM Based Network Anomaly Detection

    The detection of anomalies in backbone networks is posing serious performance issues, not only in terms of accuracy, but also in terms of detection speed. Indeed current software solutions to the problem, even promising from the point of view of detection and false alarm rates, suffer from the inability of...

    Provided By University of Piraeus

  • White Papers // May 2012

    Combining Wavelet Analysis and CUSUM Algorithm for Network Anomaly Detection

    In the last years CUSUM based algorithms have emerged as a good basis to develop efficient systems able to detect anomalies and attacks in the network traffic. Nevertheless, such techniques are still far from providing an ideal solution to the problem, mainly because of the huge number of false alarms...

    Provided By University of Piraeus

  • White Papers // May 2012

    The LogLog Counting Reversible Sketch: A Distributed Architecture for Detecting Anomalies in Backbone Networks

    The increasing number of network attacks causes growing problems for network operators and users. Thus, detecting anomalous traffic is of primary interest in IP networks management and many detection techniques, able to promptly reveal and identify network attacks, mainly detecting Heavy Changes (HCs) in the network traffic, have been proposed....

    Provided By University of Piraeus

  • White Papers // May 2012

    A Hybrid Multidimensional Algorithm for Network-Aware Resource Scheduling in Clouds and Grids

    Today's e-Infrastructures are deployed to enable easy and secure access to heterogeneous resources (e.g., instrument, computing and storage elements) by exploiting cloud and grid technologies. Since e-Science applications are usually characterized by huge data transfers, user interactivity and high computational loads, the selection and allocation of cloud or grid resources...

    Provided By University of Piraeus

  • White Papers // May 2012

    Signal Processing Applied to Chemically Inspired Communication Protocols

    A challenging problem when engineering network and communication protocols is to predict and formally describe the dynamic behavior of a protocol. Chemical Networking Protocols (CNPs) offer the opportunity to transpose the good and well-understood analyzability of chemical reactions to networking protocols, not only at the design stage of protocols, but...

    Provided By University of Piraeus

  • White Papers // Sep 2011

    Approaches to Modeling Business Processes. a Critical Analysis of BPMN, Workflow Patterns and YAWL

    The authors investigate three approaches to describing models of business processes: the OMG standard BPMN in its recent version 2.0, the workflow patterns of the workflow pattern initiative and their reference implementation YAWL. They show how the three approaches fail to provide practitioners with a suitable means precisely and faithfully...

    Provided By University of Piraeus

  • White Papers // Aug 2011

    Statistical Model of Downlink Power Consumption in Cellular CDMA Networks

    This paper proposes a theoretical statistical model of the downlink power consumption in cellular CDMA networks. The proposed model employs a simple but popular propagation model, which breaks down path losses into a distance dependent and a log-normal shadowing loss term. Based on the aforementioned path loss formalism, closed-form expressions...

    Provided By University of Piraeus

  • White Papers // Nov 2010

    A Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANETs) are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems (IDSs) may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders, and then initiate the appropriate countermeasures. IDS...

    Provided By University of Piraeus

  • White Papers // Nov 2010

    On Designing Multicore-Aware Simulators for Biological Systems

    The stochastic simulation of biological systems is an increasingly popular technique in bioinformatics. It often is an enlightening technique, which may however result in being computational expensive. The authors discuss the main opportunities to speed it up on multi-core platforms, which pose new challenges for parallelization techniques. These opportunities are...

    Provided By University of Piraeus

  • White Papers // Aug 2010

    BPMN Modelling of Services with Dynamically Reconfigurable Transactions

    The authors promote the use of transactional attributes for modeling business processes in the service-oriented scenario. Transactional attributes have been introduced in Enterprise JavaBeans (EJB) to decorate the methods published in Java containers. Attributes describe \"Modalities\" that discipline the reconfiguration of transactional scopes (i.e., of caller and callee) upon method...

    Provided By University of Piraeus

  • White Papers // Jul 2010

    An Empirical Research On Early Bankruptcy Forecasting Models: Does Logit Analysis Enhance Business Failure Predictability?

    The forecast of bankruptcy is of grate value to investors, creditors, lenders and anyone who relies upon the company viability. As a consequence, numerous studies have tried to develop models enhancing early bankruptcy forecasting. To this end, Logit is the most frequently employed methodology, because it has been proved very...

    Provided By University of Piraeus

  • White Papers // Jun 2010

    ETSI RRS - The Standardization Path to Next Generation Cognitive Radio Systems

    This paper details the current work status of the ETSI Reconfigurable Radio Systems (RRS) Technical Committee (TC) and gives an outlook on the future evolution. While previous publications have presented an overview of ETSI RRS' main working axes related to Cognitive Radio System Aspects, Radio Equipment Architecture (including a Cognitive...

    Provided By University of Piraeus

  • White Papers // Jun 2010

    Adaptive BLAST Decision-Feedback Equalizer FOR MIMO-FBMC/OQAM Systems

    Filter Bank-based MultiCarrier modulation (FBMC) using Offset Quadrature Amplitude Modulation (OQAM), known as FBMC/OQAM, provides an attractive alternative to the conventional Cyclic Prefix-based Orthogonal Frequency Division Multiplexing (CP-OFDM), especially in terms of increased robustness to frequency offset and Doppler spread, and high bandwidth efficiency. However, channel equalization in FBMC/OQAM is...

    Provided By University of Piraeus

  • White Papers // Jun 2010

    A Call Conference Room Interception Attack and Its Detection

    The IP Multimedia Subsystem (IMS) infrastructure is currently considered to be the main core of Next Generation Networks (NGNs), integrating IP and other network types under one common infrastructure. Consequently, IMS inherits security flaws and vulnerabilities residing in all those technologies. Besides, the protection against unauthorized access in NGN services...

    Provided By University of Piraeus

  • White Papers // May 2010

    Bank Efficiency And Bank Lending Channel: Evidence From A Panel Of European Banks

    This paper examines two questions: first, it investigates the efficiency of the banking systems in eight European countries over the period 1994 to 2008 by using the production frontier methodology and following the approach suggested in Mester (1996), the authors show that risk factors should be taken into account, otherwise...

    Provided By University of Piraeus

  • White Papers // Apr 2010

    BPMN Core Modeling Concepts: Inheritance-Based Execution Semantics

    The authors define a paper model for the dynamic semantics of the core process modeling concepts in the OMG standard for BPMN 2.0. The UML class diagrams associated therein with each flow element are extended with a rigorous behavior definition, which reflects the inheritance hierarchy structure by refinement steps. The...

    Provided By University of Piraeus

  • White Papers // Oct 2009

    Detecting Trustworthy Real-Time Communications Using a Web-of-Trust

    Voice-over-IP protocols (e.g., SIP) are vulnerable to many types of attacks. One core challenge in preventing VoIP attacks is to assess the trustworthiness of the caller's identity. Further, spoofing attacks must be prevented by verifying that the call has been initiated by the user belonging to the caller's identity. In...

    Provided By University of Piraeus

  • White Papers // Sep 2009

    CBID: A Scalable Method for Distributed Data Aggregation in WSNs

    Mobile Agents (MAs) are referred to as autonomous programs able to move among network nodes towards the completion of an assigned task. The authors' proposal involves MA middleware in WSNs to achieve higher energy savings and reduced response time when considering data retrieval and aggregation. To meet this objective they...

    Provided By University of Piraeus

  • White Papers // May 2009

    Using BPMN and Tracing for Rapid Business Process Prototyping Environments

    Business Process (BP) analysis aims to investigate properties of BPs by performing simulation, diagnosis and verification with the goal of supporting BP Management (BPM). In this paper, the authors propose a framework for BPM that relies on the BP Modeling Notation (BPMN). More specifically, they first introduce a method to...

    Provided By University of Piraeus

  • White Papers // Aug 2008

    A Method for Verifiable and Validatable Business Process Modeling

    The authors define an extensible semantical framework for business process modeling notations. Since their definition starts from scratch, it helps to faithfully link the understanding of business processes by analysts and operators, on the process design and management side, by IT technologists and programmers, on the implementation side, and by...

    Provided By University of Piraeus

  • White Papers // Jul 2007

    Risk Management in ERP Project Introduction: Review of the Literature

    In recent years, ERP systems have received much attention. However, ERP projects have often been found to be complex and risky to implement in business enterprises. The organizational relevance and risk of ERP projects make it important for organizations to focus on ways to make ERP implementation successful. The authors...

    Provided By University of Piraeus

  • White Papers // Sep 2006

    From BPEL Processes to YAWL Workflows

    BPEL is currently the most widespread language for composing Web services, but it lacks formal semantics. YAWL is a workflow language with a well defined formal semantics that implements the most common workflow patterns. In this paper, the authors provide a methodology for translating BPEL processes into YAWL workflows, thus...

    Provided By University of Piraeus

  • White Papers // Nov 2012

    An Open Hardware Implementation of CUSUM Based Network Anomaly Detection

    The detection of anomalies in backbone networks is posing serious performance issues, not only in terms of accuracy, but also in terms of detection speed. Indeed current software solutions to the problem, even promising from the point of view of detection and false alarm rates, suffer from the inability of...

    Provided By University of Piraeus

  • White Papers // Feb 2013

    Improving the Utilization of an Elastic Resource: A Client-Side Approach

    Resource management is traditionally addressed by policies implemented inside the resource provider. Here the authors study the problem with an attitude that is specular but complementary, which consists in designing a distributed client-side access regulation algorithm that improves the utilization of an elastic resource. The introduction of elastic resources -...

    Provided By University of Piraeus

  • White Papers // Oct 2009

    Detecting Trustworthy Real-Time Communications Using a Web-of-Trust

    Voice-over-IP protocols (e.g., SIP) are vulnerable to many types of attacks. One core challenge in preventing VoIP attacks is to assess the trustworthiness of the caller's identity. Further, spoofing attacks must be prevented by verifying that the call has been initiated by the user belonging to the caller's identity. In...

    Provided By University of Piraeus

  • White Papers // Jul 2010

    An Empirical Research On Early Bankruptcy Forecasting Models: Does Logit Analysis Enhance Business Failure Predictability?

    The forecast of bankruptcy is of grate value to investors, creditors, lenders and anyone who relies upon the company viability. As a consequence, numerous studies have tried to develop models enhancing early bankruptcy forecasting. To this end, Logit is the most frequently employed methodology, because it has been proved very...

    Provided By University of Piraeus

  • White Papers // Jun 2010

    A Call Conference Room Interception Attack and Its Detection

    The IP Multimedia Subsystem (IMS) infrastructure is currently considered to be the main core of Next Generation Networks (NGNs), integrating IP and other network types under one common infrastructure. Consequently, IMS inherits security flaws and vulnerabilities residing in all those technologies. Besides, the protection against unauthorized access in NGN services...

    Provided By University of Piraeus

  • White Papers // May 2010

    Bank Efficiency And Bank Lending Channel: Evidence From A Panel Of European Banks

    This paper examines two questions: first, it investigates the efficiency of the banking systems in eight European countries over the period 1994 to 2008 by using the production frontier methodology and following the approach suggested in Mester (1996), the authors show that risk factors should be taken into account, otherwise...

    Provided By University of Piraeus

  • White Papers // Nov 2010

    A Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANETs) are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems (IDSs) may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders, and then initiate the appropriate countermeasures. IDS...

    Provided By University of Piraeus

  • White Papers // Aug 2011

    Statistical Model of Downlink Power Consumption in Cellular CDMA Networks

    This paper proposes a theoretical statistical model of the downlink power consumption in cellular CDMA networks. The proposed model employs a simple but popular propagation model, which breaks down path losses into a distance dependent and a log-normal shadowing loss term. Based on the aforementioned path loss formalism, closed-form expressions...

    Provided By University of Piraeus

  • White Papers // Jun 2010

    Adaptive BLAST Decision-Feedback Equalizer FOR MIMO-FBMC/OQAM Systems

    Filter Bank-based MultiCarrier modulation (FBMC) using Offset Quadrature Amplitude Modulation (OQAM), known as FBMC/OQAM, provides an attractive alternative to the conventional Cyclic Prefix-based Orthogonal Frequency Division Multiplexing (CP-OFDM), especially in terms of increased robustness to frequency offset and Doppler spread, and high bandwidth efficiency. However, channel equalization in FBMC/OQAM is...

    Provided By University of Piraeus

  • White Papers // Jun 2010

    ETSI RRS - The Standardization Path to Next Generation Cognitive Radio Systems

    This paper details the current work status of the ETSI Reconfigurable Radio Systems (RRS) Technical Committee (TC) and gives an outlook on the future evolution. While previous publications have presented an overview of ETSI RRS' main working axes related to Cognitive Radio System Aspects, Radio Equipment Architecture (including a Cognitive...

    Provided By University of Piraeus

  • White Papers // Sep 2009

    CBID: A Scalable Method for Distributed Data Aggregation in WSNs

    Mobile Agents (MAs) are referred to as autonomous programs able to move among network nodes towards the completion of an assigned task. The authors' proposal involves MA middleware in WSNs to achieve higher energy savings and reduced response time when considering data retrieval and aggregation. To meet this objective they...

    Provided By University of Piraeus

  • White Papers // May 2012

    Combining Wavelet Analysis and CUSUM Algorithm for Network Anomaly Detection

    In the last years CUSUM based algorithms have emerged as a good basis to develop efficient systems able to detect anomalies and attacks in the network traffic. Nevertheless, such techniques are still far from providing an ideal solution to the problem, mainly because of the huge number of false alarms...

    Provided By University of Piraeus

  • White Papers // May 2012

    The LogLog Counting Reversible Sketch: A Distributed Architecture for Detecting Anomalies in Backbone Networks

    The increasing number of network attacks causes growing problems for network operators and users. Thus, detecting anomalous traffic is of primary interest in IP networks management and many detection techniques, able to promptly reveal and identify network attacks, mainly detecting Heavy Changes (HCs) in the network traffic, have been proposed....

    Provided By University of Piraeus

  • White Papers // May 2012

    A Hybrid Multidimensional Algorithm for Network-Aware Resource Scheduling in Clouds and Grids

    Today's e-Infrastructures are deployed to enable easy and secure access to heterogeneous resources (e.g., instrument, computing and storage elements) by exploiting cloud and grid technologies. Since e-Science applications are usually characterized by huge data transfers, user interactivity and high computational loads, the selection and allocation of cloud or grid resources...

    Provided By University of Piraeus

  • White Papers // May 2012

    Signal Processing Applied to Chemically Inspired Communication Protocols

    A challenging problem when engineering network and communication protocols is to predict and formally describe the dynamic behavior of a protocol. Chemical Networking Protocols (CNPs) offer the opportunity to transpose the good and well-understood analyzability of chemical reactions to networking protocols, not only at the design stage of protocols, but...

    Provided By University of Piraeus

  • White Papers // May 2013

    Integrating Autonomic Grid Components and Process-Driven Business Applications

    Today's business applications are increasingly process driven, meaning that the main application logic is executed by a dedicate process engine. In addition, component-oriented software development has been attracting attention for building complex distributed applications. In this paper, the authors present the experiences gained from building a process-driven biometric identification application...

    Provided By University of Piraeus

  • White Papers // Jun 2013

    STaR: A Reconfigurable and Transparent Middleware for WSNs Security

    Wireless Sensor Networks (WSNs) are prone to security at-tacks. In order to protect the network from potential adversaries, it is necessary to secure communications between sensor nodes. Also, if the authors consider a network of heterogeneous objects including WSNs, security requirements may be far more complex. In particular, a single...

    Provided By University of Piraeus

  • White Papers // Nov 2010

    On Designing Multicore-Aware Simulators for Biological Systems

    The stochastic simulation of biological systems is an increasingly popular technique in bioinformatics. It often is an enlightening technique, which may however result in being computational expensive. The authors discuss the main opportunities to speed it up on multi-core platforms, which pose new challenges for parallelization techniques. These opportunities are...

    Provided By University of Piraeus

  • White Papers // May 2009

    Using BPMN and Tracing for Rapid Business Process Prototyping Environments

    Business Process (BP) analysis aims to investigate properties of BPs by performing simulation, diagnosis and verification with the goal of supporting BP Management (BPM). In this paper, the authors propose a framework for BPM that relies on the BP Modeling Notation (BPMN). More specifically, they first introduce a method to...

    Provided By University of Piraeus

  • White Papers // Aug 2010

    BPMN Modelling of Services with Dynamically Reconfigurable Transactions

    The authors promote the use of transactional attributes for modeling business processes in the service-oriented scenario. Transactional attributes have been introduced in Enterprise JavaBeans (EJB) to decorate the methods published in Java containers. Attributes describe \"Modalities\" that discipline the reconfiguration of transactional scopes (i.e., of caller and callee) upon method...

    Provided By University of Piraeus

  • White Papers // Apr 2010

    BPMN Core Modeling Concepts: Inheritance-Based Execution Semantics

    The authors define a paper model for the dynamic semantics of the core process modeling concepts in the OMG standard for BPMN 2.0. The UML class diagrams associated therein with each flow element are extended with a rigorous behavior definition, which reflects the inheritance hierarchy structure by refinement steps. The...

    Provided By University of Piraeus

  • White Papers // Sep 2011

    Approaches to Modeling Business Processes. a Critical Analysis of BPMN, Workflow Patterns and YAWL

    The authors investigate three approaches to describing models of business processes: the OMG standard BPMN in its recent version 2.0, the workflow patterns of the workflow pattern initiative and their reference implementation YAWL. They show how the three approaches fail to provide practitioners with a suitable means precisely and faithfully...

    Provided By University of Piraeus

  • White Papers // Aug 2008

    A Method for Verifiable and Validatable Business Process Modeling

    The authors define an extensible semantical framework for business process modeling notations. Since their definition starts from scratch, it helps to faithfully link the understanding of business processes by analysts and operators, on the process design and management side, by IT technologists and programmers, on the implementation side, and by...

    Provided By University of Piraeus

  • White Papers // Jul 2007

    Risk Management in ERP Project Introduction: Review of the Literature

    In recent years, ERP systems have received much attention. However, ERP projects have often been found to be complex and risky to implement in business enterprises. The organizational relevance and risk of ERP projects make it important for organizations to focus on ways to make ERP implementation successful. The authors...

    Provided By University of Piraeus

  • White Papers // Sep 2006

    From BPEL Processes to YAWL Workflows

    BPEL is currently the most widespread language for composing Web services, but it lacks formal semantics. YAWL is a workflow language with a well defined formal semantics that implements the most common workflow patterns. In this paper, the authors provide a methodology for translating BPEL processes into YAWL workflows, thus...

    Provided By University of Piraeus