University of Stuttgart

Displaying 1-17 of 17 results

  • White Papers // Mar 2012

    DynFire: Dynamic Firewalling in Heterogeneous Environments

    This paper presents "Dyn-Fire," a novel approach for the role-based, dynamic control of network firewalls. Dyn-Fire allows an individually controlled, secure access to the IT resources of a large organization, with particular focus on mobile users and users with restricted rights, such as subcontractors. The basic assumption behind Dyn-Fire is...

    Provided By University of Stuttgart

  • White Papers // Dec 2011

    Design and Evaluation of an Architecture for Ubiquitous User Authentication Based on Identity Management Systems

    Now-a-days, users consume digital services with their digital identities on a multitude of different devices, e.g. notebooks, Smartphone or even TV sets. Hereby, users are faced with additional challenges, i.e., devices have different security levels and not all digital identities must be used on all devices. Identities used for home...

    Provided By University of Stuttgart

  • White Papers // Oct 2011

    Proposal of an IC 1004 Reference Simulation Environment

    The increasing complexity in nowadays networks enforces the need for automation and a better understanding of radio network modeling. To ensure comparability of simulation results the authors propose a common simulation environment for the IC 1004. The aim of this paper is to actuate discussions on the desirable content of...

    Provided By University of Stuttgart

  • White Papers // Oct 2010

    Cost-Optimal Outsourcing of Applications Into the Clouds

    Commercial services for provisioning software components and virtual infrastructure in the cloud are emerging. For customers, this creates a multitude of possibilities for outsourcing part of the IT-stack to third parties in order to run their applications. These possibilities are associated with different running costs, so cloud customers have to...

    Provided By University of Stuttgart

  • White Papers // Jun 2010

    Business Intelligence In The Cloud?

    Business Intelligence (BI) deals with integrated approaches to management support. In many cases, the integrated infrastructures that are subject to BI have become complex, costly, and inflexible. A possible remedy for these issues might arise on the horizon with "Cloud Computing" concepts that promise new options for a net based...

    Provided By University of Stuttgart

  • White Papers // Jun 2010

    Cooperative Interference-Aware Joint Scheduling for the 3GPP LTE Uplink

    In current cellular networks Base Stations (BSs) usually perform independent scheduling without coordinating the resource allocation among different cells. This, however, often leads to high interference levels in cellular networks operating with universal frequency reuse, such as the 3GPP UTRAN Long Term Evolution (LTE). Coordinated scheduling between different BSs may...

    Provided By University of Stuttgart

  • White Papers // Jun 2010

    Development of a Low-Cost Sensor System for Use on Gyrocopters

    Direct georeferencing of airborne imaging sensors with high precision GNSS and inertial technology is an established practice used in numerous aerial survey mapping projects nowadays. Those integrated systems of high quality aerial cameras and orientation sensors have their price which finds its expression in the high price level of aerial...

    Provided By University of Stuttgart

  • White Papers // May 2010

    Inter-Site Joint Detection With Reduced Backhaul Capacity Requirements for the 3GPP LTE Uplink

    Cellular networks operating with a frequency reuse factor of one are often interference-limited. For that reason, Base Station (BS) cooperation techniques aiming at mitigating the effects of interference caused by simultaneous transmissions on the same frequency resources in nearby sectors may considerably improve the system performance. However, for that purpose...

    Provided By University of Stuttgart

  • White Papers // May 2010

    Web Services and Processing Pipelines in HLT: Tool Evaluation, LR Production and Validation

    At the end of 2009 the review of a number of available Web services implementing linguistic processing chains was prepared as part of Common Language Resources and Technology Infrastructure (CLARIN) Working Group 5.6 (LRT Integration) activities. Basing on the showcases contributed by WG members, the summary of features of both...

    Provided By University of Stuttgart

  • White Papers // Jan 2010

    Cooperative Interference Prediction for Enhanced Link Adaptation in the 3GPP LTE Uplink

    The interference situation in the uplink of cellular networks, such as the 3GPP UTRAN Long Term Evolution (LTE), is usually highly volatile since from one transmission time interval to the other different users might be scheduled in nearby cells, thus often causing completely different levels of interference. This unstable behavior...

    Provided By University of Stuttgart

  • White Papers // Jan 2010

    Performance of the LTE Uplink With Intra-Site Joint Detection and Joint Link Adaptation

    The authors evaluate the performance of the uplink of a 3GPP UTRAN Long Term Evolution (LTE) system with intra-site cooperation, where different sectors belonging to the same site may cooperate with each other in order to improve the system performance. This represents an intermediate step towards general Coordinated MultiPoint (CoMP)...

    Provided By University of Stuttgart

  • White Papers // Dec 2009

    Fair Exchange of Digital Signatures Using RSA-Based CEMBS and Offline STTP

    One of the essential security services needed to safeguard online transactions is fair exchange. In fair exchange protocols two parties can exchange their signatures in a fair manner, so that either each party gain the other's signature or no one obtain anything useful. This paper examines security solutions for achieving...

    Provided By University of Stuttgart

  • White Papers // Oct 2009

    Runtime Prediction of Service Level Agreement Violations for Composite Services

    SLAs are contractually binding agreements between service providers and consumers, mandating concrete numerical target values which the service needs to achieve. For service providers, it is essential to prevent SLA violations as much as possible to enhance customer satisfaction and avoid penalty payments. Therefore, it is desirable for providers to...

    Provided By University of Stuttgart

  • White Papers // Sep 2009

    A Component-Based Simulation Model and Its Implementation of a Switched Ethernet Network

    Today, Ethernet is the most widely used Local Area Networking (LAN) technology. Apart from LAN installations, Ethernet became also attractive for other application areas, ranging from telecommunications to industry and avionics. The range of application areas for Ethernet keeps growing. Since each application area has its unique requirements, the IEEE...

    Provided By University of Stuttgart

  • White Papers // May 2009

    A Graph-Based Scheme for Distributed Interference Coordination in Cellular OFDMA Networks

    Wireless systems based on Orthogonal Frequency Division Multiple Access (OFDMA) multiplex different users in time and frequency. One of the main problems in OFDMA-systems is the inter-cell interference. A promising approach to solve this problem is InterFerence Co-Ordination (IFCO). In this paper, the authors present a novel distributed IFCO scheme,...

    Provided By University of Stuttgart

  • White Papers // Apr 2009

    Constraints and Triggers to Enhance XML-Based Data Integration Systems

    XML is becoming one of the main technological integredients of the Internet. It is now accepted as the standard for information exchange. XML-based data integration system, which enables sharing and cooperation with legacy data sources, arises as a more and more important data service provider on the web. These services...

    Provided By University of Stuttgart

  • White Papers // Feb 2009

    Functional Interface for Universal Access to Ethernet-Based Field Bus Protocols

    Today's field bus systems for connecting automation components in and between machines and units have a very high performance in regard to their transmission rate and realtime capability. Furthermore, they comprehend a multitude of functionalities like cross communication, safety protocols and automated address assignment. In addition, they define special logical...

    Provided By University of Stuttgart

  • White Papers // Jun 2010

    Cooperative Interference-Aware Joint Scheduling for the 3GPP LTE Uplink

    In current cellular networks Base Stations (BSs) usually perform independent scheduling without coordinating the resource allocation among different cells. This, however, often leads to high interference levels in cellular networks operating with universal frequency reuse, such as the 3GPP UTRAN Long Term Evolution (LTE). Coordinated scheduling between different BSs may...

    Provided By University of Stuttgart

  • White Papers // Jan 2010

    Performance of the LTE Uplink With Intra-Site Joint Detection and Joint Link Adaptation

    The authors evaluate the performance of the uplink of a 3GPP UTRAN Long Term Evolution (LTE) system with intra-site cooperation, where different sectors belonging to the same site may cooperate with each other in order to improve the system performance. This represents an intermediate step towards general Coordinated MultiPoint (CoMP)...

    Provided By University of Stuttgart

  • White Papers // Jan 2010

    Cooperative Interference Prediction for Enhanced Link Adaptation in the 3GPP LTE Uplink

    The interference situation in the uplink of cellular networks, such as the 3GPP UTRAN Long Term Evolution (LTE), is usually highly volatile since from one transmission time interval to the other different users might be scheduled in nearby cells, thus often causing completely different levels of interference. This unstable behavior...

    Provided By University of Stuttgart

  • White Papers // Oct 2011

    Proposal of an IC 1004 Reference Simulation Environment

    The increasing complexity in nowadays networks enforces the need for automation and a better understanding of radio network modeling. To ensure comparability of simulation results the authors propose a common simulation environment for the IC 1004. The aim of this paper is to actuate discussions on the desirable content of...

    Provided By University of Stuttgart

  • White Papers // Dec 2011

    Design and Evaluation of an Architecture for Ubiquitous User Authentication Based on Identity Management Systems

    Now-a-days, users consume digital services with their digital identities on a multitude of different devices, e.g. notebooks, Smartphone or even TV sets. Hereby, users are faced with additional challenges, i.e., devices have different security levels and not all digital identities must be used on all devices. Identities used for home...

    Provided By University of Stuttgart

  • White Papers // Mar 2012

    DynFire: Dynamic Firewalling in Heterogeneous Environments

    This paper presents "Dyn-Fire," a novel approach for the role-based, dynamic control of network firewalls. Dyn-Fire allows an individually controlled, secure access to the IT resources of a large organization, with particular focus on mobile users and users with restricted rights, such as subcontractors. The basic assumption behind Dyn-Fire is...

    Provided By University of Stuttgart

  • White Papers // Oct 2009

    Runtime Prediction of Service Level Agreement Violations for Composite Services

    SLAs are contractually binding agreements between service providers and consumers, mandating concrete numerical target values which the service needs to achieve. For service providers, it is essential to prevent SLA violations as much as possible to enhance customer satisfaction and avoid penalty payments. Therefore, it is desirable for providers to...

    Provided By University of Stuttgart

  • White Papers // Feb 2009

    Functional Interface for Universal Access to Ethernet-Based Field Bus Protocols

    Today's field bus systems for connecting automation components in and between machines and units have a very high performance in regard to their transmission rate and realtime capability. Furthermore, they comprehend a multitude of functionalities like cross communication, safety protocols and automated address assignment. In addition, they define special logical...

    Provided By University of Stuttgart

  • White Papers // May 2010

    Web Services and Processing Pipelines in HLT: Tool Evaluation, LR Production and Validation

    At the end of 2009 the review of a number of available Web services implementing linguistic processing chains was prepared as part of Common Language Resources and Technology Infrastructure (CLARIN) Working Group 5.6 (LRT Integration) activities. Basing on the showcases contributed by WG members, the summary of features of both...

    Provided By University of Stuttgart

  • White Papers // Apr 2009

    Constraints and Triggers to Enhance XML-Based Data Integration Systems

    XML is becoming one of the main technological integredients of the Internet. It is now accepted as the standard for information exchange. XML-based data integration system, which enables sharing and cooperation with legacy data sources, arises as a more and more important data service provider on the web. These services...

    Provided By University of Stuttgart

  • White Papers // Sep 2009

    A Component-Based Simulation Model and Its Implementation of a Switched Ethernet Network

    Today, Ethernet is the most widely used Local Area Networking (LAN) technology. Apart from LAN installations, Ethernet became also attractive for other application areas, ranging from telecommunications to industry and avionics. The range of application areas for Ethernet keeps growing. Since each application area has its unique requirements, the IEEE...

    Provided By University of Stuttgart

  • White Papers // Jun 2010

    Business Intelligence In The Cloud?

    Business Intelligence (BI) deals with integrated approaches to management support. In many cases, the integrated infrastructures that are subject to BI have become complex, costly, and inflexible. A possible remedy for these issues might arise on the horizon with "Cloud Computing" concepts that promise new options for a net based...

    Provided By University of Stuttgart

  • White Papers // Oct 2010

    Cost-Optimal Outsourcing of Applications Into the Clouds

    Commercial services for provisioning software components and virtual infrastructure in the cloud are emerging. For customers, this creates a multitude of possibilities for outsourcing part of the IT-stack to third parties in order to run their applications. These possibilities are associated with different running costs, so cloud customers have to...

    Provided By University of Stuttgart

  • White Papers // May 2009

    A Graph-Based Scheme for Distributed Interference Coordination in Cellular OFDMA Networks

    Wireless systems based on Orthogonal Frequency Division Multiple Access (OFDMA) multiplex different users in time and frequency. One of the main problems in OFDMA-systems is the inter-cell interference. A promising approach to solve this problem is InterFerence Co-Ordination (IFCO). In this paper, the authors present a novel distributed IFCO scheme,...

    Provided By University of Stuttgart

  • White Papers // Jun 2010

    Development of a Low-Cost Sensor System for Use on Gyrocopters

    Direct georeferencing of airborne imaging sensors with high precision GNSS and inertial technology is an established practice used in numerous aerial survey mapping projects nowadays. Those integrated systems of high quality aerial cameras and orientation sensors have their price which finds its expression in the high price level of aerial...

    Provided By University of Stuttgart

  • White Papers // May 2010

    Inter-Site Joint Detection With Reduced Backhaul Capacity Requirements for the 3GPP LTE Uplink

    Cellular networks operating with a frequency reuse factor of one are often interference-limited. For that reason, Base Station (BS) cooperation techniques aiming at mitigating the effects of interference caused by simultaneous transmissions on the same frequency resources in nearby sectors may considerably improve the system performance. However, for that purpose...

    Provided By University of Stuttgart

  • White Papers // Dec 2009

    Fair Exchange of Digital Signatures Using RSA-Based CEMBS and Offline STTP

    One of the essential security services needed to safeguard online transactions is fair exchange. In fair exchange protocols two parties can exchange their signatures in a fair manner, so that either each party gain the other's signature or no one obtain anything useful. This paper examines security solutions for achieving...

    Provided By University of Stuttgart