University of Sunderland

Displaying 1-28 of 28 results

  • White Papers // Sep 2013

    An Intrusion Detection & Adaptive Response Mechanism for MANETs

    Mobile Ad-hoc NETworks (MANETs) are vulnerable to a variety of network layer attacks such as black hole, grey hole, sleep deprivation & rushing attacks. In this paper, the authors present an intrusion detection & adaptive response mechanism for MANETs that detects a range of attacks and provides an effective response...

    Provided By University of Sunderland

  • White Papers // Aug 2013

    Secure Modular Password Authentication for the Web Using Channel Bindings

    Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a...

    Provided By University of Sunderland

  • White Papers // Nov 2012

    Security Analysis for Delay/Disruption Tolerant Satellite and Sensor Networks

    Today's internet protocols perform poorly when faced with heterogeneous environments characterized by very long delay paths and possible link disruptions such as satellite and sensor networks. In the last few years, delay/disruption tolerant networking has grown to a healthy research topic because of its suitability for challenged environments characterized by...

    Provided By University of Sunderland

  • White Papers // Nov 2012

    Generating SQL Queries from SBVR Rules

    Declarative technologies have made great strides in expressivity between SQL and SBVR. SBVR models are more expressive that SQL schemas, but not as imminently executable yet. In this paper, the authors complete the architecture of a system that can execute SBVR models. They do this by describing how SBVR rules...

    Provided By University of Sunderland

  • White Papers // Sep 2012

    Plaintext Awareness in Identity-Based Key Encapsulation

    The notion of Plaintext Awareness (PA) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving INdistinguishability against aDaptive Chosen Ciphertext Attacks (IND-CCA), and can be used to construct privacy-preserving protocols such as...

    Provided By University of Sunderland

  • White Papers // Aug 2012

    An SBVR Framework for RESTful Web Applications

    The authors propose a framework that can be used to produce functioning web applications from SBVR models. To achieve this, they begin by discussing the concept of declarative application generation and examining the commonalities between SBVR and the RESTful architectural style of the web. They then show how a relational...

    Provided By University of Sunderland

  • White Papers // May 2012

    A Closed-Loop Control Traffic Engineering System for the Dynamic Load Balancing of Inter-AS Traffic

    Inter-AS outbound Traffic Engineering (TE) is a set of techniques for controlling inter-AS traffic exiting an Autonomous System (AS) by assigning the traffic to the best egress points (i.e. routers or links) from which the traffic is forwarded to adjacent ASes towards the destinations. In practice, changing network conditions such...

    Provided By University of Sunderland

  • White Papers // May 2012

    Distributed Interference-Aware Admission Control With Soft Resource Allocation for Hybrid MAC in Wireless Mesh Networks

    Supporting Quality of Service (QoS) while fulfilling high efficiency of bandwidth utilization is challenging in wireless mesh networks. To deal with this issue, hybrid Medium Access Control (MAC) protocols are effective candidates because they can achieve QoS support and better resource sharing at the same time. However, in multi-hop communication...

    Provided By University of Sunderland

  • White Papers // May 2012

    Compressive Autonomous Sensing (CASe) for Wideband Spectrum Sensing

    Compressive spectrum sensing techniques present many advantages over traditional spectrum sensing approaches, e.g., low sampling rate, and reduced energy consumption. However, when the spectral sparsity level is unknown, there are two significant challenges. They are: how to choose an appropriate number of measurements, and when to terminate the greedy recovery...

    Provided By University of Sunderland

  • White Papers // May 2012

    Spraying the Replication Probability With Geographic Assistance for Delay Tolerant Networks

    Receiving great interest from the research community, Delay Tolerant Networks (DTNs) are a type of Next Generation Networks (NGNs) proposed to bridge communication in challenged environments. In this paper, the message replication probability is proportionally sprayed for efficient routing mainly under sparse scenario. This methodology is different from the spray...

    Provided By University of Sunderland

  • White Papers // May 2012

    Performance of Multicell Joint Processing Planar Cellular Uplink in the Presence of Relay Nodes

    In this paper, the authors compare the uplink performance of various deployment scenarios in the planar (hexagonal) cellular system where the received signals at multiple cells are jointly processed by a central processor. A mathematical model of the planar cellular system is presented and its performance metric is based on...

    Provided By University of Sunderland

  • White Papers // Mar 2012

    Distributed MAC Scheduling Mechanism Based on Resource Reservation for IEEE 802.11e-Based Multi-Hop Wireless Networks

    Multi-hop wireless communication is playing a key role in today's communication networks. Despite several advancements in communication protocols and technologies, QoS provisioning is still a challenging issue in multi-hop wireless communications. In this paper, the authors propose a novel scheduling mechanism based on resource reservation for guaranteeing the QoS performance...

    Provided By University of Sunderland

  • White Papers // Mar 2012

    Energy-Efficiency Based Resource Allocation for the Scalar Broadcast Channel

    Until recently, link adaptation and resource allocation for communication system relied extensively on the spectral efficiency as an optimization criterion. With the emergence of the Energy Efficiency (EE) as a key system design criterion, resource allocation based on EE is becoming of great interest. In this paper, the authors propose...

    Provided By University of Sunderland

  • White Papers // Mar 2012

    Selecting Users in Energy-Efficient Collaborative Spectrum Sensing

    Cognitive radio network is defined as an intelligent wireless communication network that should be able to adaptively reconfigure its communication parameters to meet the demands of the transmission network or the user. In this context one possible way to utilize unused licensed spectrum without interfering with incumbent users is through...

    Provided By University of Sunderland

  • White Papers // Mar 2012

    A Mobility Vector Based Routing Algorithm for Delay Tolerant Networks Using History Geographic Information

    The concept of Delay Tolerant Networks (DTNs) are proposed to facilitate communication in challenged mobile wireless networks using the Store-Carry-Forward (SCF) routing behavior. In this paper, the authors' motivation is to take advantage of geographic routing since it routes message without the knowledge about network topology by using real-time location...

    Provided By University of Sunderland

  • White Papers // Mar 2012

    Adding Cloud Performance to Service Level Agreements

    To some the next iteration of Grid and utility computing, Clouds offer capabilities for the high-availability of a wide range of systems. But it is argued that such systems will only attain acceptance by a larger audience of commercial end-users if binding Service Level Agreements (SLAs) are provided. In this...

    Provided By University of Sunderland

  • White Papers // Feb 2012

    Teaching Clouds: Lessons Taught and Lessons Learnt and Lessons Learnt

    In this paper, the authors discuss the scope, content, and technical challenges offered up in the construction and delivery of a 10 week long Cloud Computing module that combines discussions of the principles and key characteristics of Cloud Computing with a series of practical exercises and an implementation-based coursework. They...

    Provided By University of Sunderland

  • White Papers // Mar 2011

    Maximizing Average Energy Efficiency for Two-User AWGN Broadcast Channel

    Energy consumption has become an increasingly important aspect of wireless communications, from both an economical and environmental point of view. New enhancements are being placed on mobile networks to reduce the power consumption of both mobile terminals and base stations. This paper studies the achievable rate region of AWGN broadcast...

    Provided By University of Sunderland

  • White Papers // Feb 2011

    Clowns, Crowds and Clouds: A Cross-Enterprise Approach to Detecting Information Leakage without Leaking Information

    In this paper, the authors elaborate a near-duplicate and plagiarism detection service that combines both Crowd and Cloud computing in searching for and evaluating matching documents. They believe that their approach could be used across collaborating or competing Enterprises, or against the web, without any Enterprise needing to reveal the...

    Provided By University of Sunderland

  • White Papers // Feb 2011

    Energy Aware Transmission in Cellular Uplink with Clustered Base Station Cooperation

    The authors provide an analytical formula to evaluate the performance of the uplink of planar cellular networks when joint processing is enabled among limited number of base stations in a generalised fading environment. Focusing on user transmission power allocation techniques to mitigate inter-cluster interference they investigate the system's spectral-energy efficiency...

    Provided By University of Sunderland

  • White Papers // Dec 2010

    Deploying IP Multimedia Subsystem (IMS) Services in Future Mobile Networks

    The Third Generation Partnership Project (3GPP) has proposed the Long Term Evolution and System Architecture Evolution (LTE/SAE) as the next stage of technologies aimed at overcoming the limitation in the existing 2G and 3G networks while driving mobile networks towards 4G standardisation. Although a new architecture has been proposed for...

    Provided By University of Sunderland

  • White Papers // Sep 2010

    An SBVR to SQL Compiler

    While the SBVR standard has been in development for several years, no reference implementation of an SBVR parser has appeared in the open source domain, raising a barrier to entry for experimentation with the language. This paper presents the implementation of a compiler of SBVR structured English to SQL data...

    Provided By University of Sunderland

  • White Papers // Jun 2010

    On the Spectral Efficiency Maximization of Nonregenerative Cooperative MIMO Communication Systems

    Amplify-and-forward (AF) is one of the most common and simple approaches for transmitting information over a cooperative Multi-Input Multi-Output (MIMO) relay channel. It has recently been demonstrated that the spectral efficiency of AF scheme can be maximized by using the relay as a smart pre-coder. However, source node pre-coding has...

    Provided By University of Sunderland

  • White Papers // Jun 2010

    Energy-Efficient Resource Allocation in Wireless OFDMA Systems

    Reducing the consumed energy in wireless communication systems has a direct impact on operational expenditure as well as CO2 emissions. With increasing interest in multimedia applications and high data rate services, environmentally sustainable communications networks must reduce the energy per delivered bit at an equal rate, if not better. This...

    Provided By University of Sunderland

  • White Papers // Feb 2010

    Towards Application-Specific Service Level Agreements: Experiments in Clouds and Grids

    Service Level Agreements (SLAs) become increasingly important in Clouds, Grids and Utilities. SLAs which provide bilaterally beneficial terms are likely to attract more consumers and clarify expectations of both consumers and providers. This chapter extends their existing work in SLAs through evaluating application-specific costs within a commercial Cloud, a private...

    Provided By University of Sunderland

  • White Papers // Sep 2009

    Interference Allowance in Clustered Joint Processing and Power Allocation

    The authors derive an analytical formula for the sum rate of the uplink of a linear network of cells when clustered joint processing is adopted among the base stations in a generalised fading environment. An inter-cluster interference allowance scheme is considered and various user power allocation profiles are investigated in...

    Provided By University of Sunderland

  • White Papers // May 2009

    Grid Service Level Agreements Using Financial Risk Analysis Techniques

    Grid computing continues to hold promise for the high-availability of a wide range of computational systems and techniques. It is suggested that Grids will attain greater acceptance by a larger audience of commercial end-users if binding Service Level Agreements (SLAs) are provided. The authors discuss Grid commoditization, and in particular...

    Provided By University of Sunderland

  • White Papers // Mar 2008

    A Self-Organising Environment for Evolving Business Activities

    In this paper, the authors are concerned with providing support for business activities in moving from value chains to value networks. They describe a fully distributed P2P architecture which reflects the dynamics of business processes that are not governed by a single organisation. The temporary virtual networks of long-term business...

    Provided By University of Sunderland

  • White Papers // Nov 2012

    Security Analysis for Delay/Disruption Tolerant Satellite and Sensor Networks

    Today's internet protocols perform poorly when faced with heterogeneous environments characterized by very long delay paths and possible link disruptions such as satellite and sensor networks. In the last few years, delay/disruption tolerant networking has grown to a healthy research topic because of its suitability for challenged environments characterized by...

    Provided By University of Sunderland

  • White Papers // Sep 2010

    An SBVR to SQL Compiler

    While the SBVR standard has been in development for several years, no reference implementation of an SBVR parser has appeared in the open source domain, raising a barrier to entry for experimentation with the language. This paper presents the implementation of a compiler of SBVR structured English to SQL data...

    Provided By University of Sunderland

  • White Papers // Aug 2012

    An SBVR Framework for RESTful Web Applications

    The authors propose a framework that can be used to produce functioning web applications from SBVR models. To achieve this, they begin by discussing the concept of declarative application generation and examining the commonalities between SBVR and the RESTful architectural style of the web. They then show how a relational...

    Provided By University of Sunderland

  • White Papers // Nov 2012

    Generating SQL Queries from SBVR Rules

    Declarative technologies have made great strides in expressivity between SQL and SBVR. SBVR models are more expressive that SQL schemas, but not as imminently executable yet. In this paper, the authors complete the architecture of a system that can execute SBVR models. They do this by describing how SBVR rules...

    Provided By University of Sunderland

  • White Papers // Aug 2013

    Secure Modular Password Authentication for the Web Using Channel Bindings

    Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a...

    Provided By University of Sunderland

  • White Papers // Sep 2013

    An Intrusion Detection & Adaptive Response Mechanism for MANETs

    Mobile Ad-hoc NETworks (MANETs) are vulnerable to a variety of network layer attacks such as black hole, grey hole, sleep deprivation & rushing attacks. In this paper, the authors present an intrusion detection & adaptive response mechanism for MANETs that detects a range of attacks and provides an effective response...

    Provided By University of Sunderland

  • White Papers // Mar 2008

    A Self-Organising Environment for Evolving Business Activities

    In this paper, the authors are concerned with providing support for business activities in moving from value chains to value networks. They describe a fully distributed P2P architecture which reflects the dynamics of business processes that are not governed by a single organisation. The temporary virtual networks of long-term business...

    Provided By University of Sunderland

  • White Papers // Sep 2009

    Interference Allowance in Clustered Joint Processing and Power Allocation

    The authors derive an analytical formula for the sum rate of the uplink of a linear network of cells when clustered joint processing is adopted among the base stations in a generalised fading environment. An inter-cluster interference allowance scheme is considered and various user power allocation profiles are investigated in...

    Provided By University of Sunderland

  • White Papers // Mar 2012

    Adding Cloud Performance to Service Level Agreements

    To some the next iteration of Grid and utility computing, Clouds offer capabilities for the high-availability of a wide range of systems. But it is argued that such systems will only attain acceptance by a larger audience of commercial end-users if binding Service Level Agreements (SLAs) are provided. In this...

    Provided By University of Sunderland

  • White Papers // May 2009

    Grid Service Level Agreements Using Financial Risk Analysis Techniques

    Grid computing continues to hold promise for the high-availability of a wide range of computational systems and techniques. It is suggested that Grids will attain greater acceptance by a larger audience of commercial end-users if binding Service Level Agreements (SLAs) are provided. The authors discuss Grid commoditization, and in particular...

    Provided By University of Sunderland

  • White Papers // Feb 2010

    Towards Application-Specific Service Level Agreements: Experiments in Clouds and Grids

    Service Level Agreements (SLAs) become increasingly important in Clouds, Grids and Utilities. SLAs which provide bilaterally beneficial terms are likely to attract more consumers and clarify expectations of both consumers and providers. This chapter extends their existing work in SLAs through evaluating application-specific costs within a commercial Cloud, a private...

    Provided By University of Sunderland

  • White Papers // Feb 2011

    Clowns, Crowds and Clouds: A Cross-Enterprise Approach to Detecting Information Leakage without Leaking Information

    In this paper, the authors elaborate a near-duplicate and plagiarism detection service that combines both Crowd and Cloud computing in searching for and evaluating matching documents. They believe that their approach could be used across collaborating or competing Enterprises, or against the web, without any Enterprise needing to reveal the...

    Provided By University of Sunderland

  • White Papers // Feb 2012

    Teaching Clouds: Lessons Taught and Lessons Learnt and Lessons Learnt

    In this paper, the authors discuss the scope, content, and technical challenges offered up in the construction and delivery of a 10 week long Cloud Computing module that combines discussions of the principles and key characteristics of Cloud Computing with a series of practical exercises and an implementation-based coursework. They...

    Provided By University of Sunderland

  • White Papers // Jun 2010

    On the Spectral Efficiency Maximization of Nonregenerative Cooperative MIMO Communication Systems

    Amplify-and-forward (AF) is one of the most common and simple approaches for transmitting information over a cooperative Multi-Input Multi-Output (MIMO) relay channel. It has recently been demonstrated that the spectral efficiency of AF scheme can be maximized by using the relay as a smart pre-coder. However, source node pre-coding has...

    Provided By University of Sunderland

  • White Papers // Mar 2011

    Maximizing Average Energy Efficiency for Two-User AWGN Broadcast Channel

    Energy consumption has become an increasingly important aspect of wireless communications, from both an economical and environmental point of view. New enhancements are being placed on mobile networks to reduce the power consumption of both mobile terminals and base stations. This paper studies the achievable rate region of AWGN broadcast...

    Provided By University of Sunderland

  • White Papers // May 2012

    A Closed-Loop Control Traffic Engineering System for the Dynamic Load Balancing of Inter-AS Traffic

    Inter-AS outbound Traffic Engineering (TE) is a set of techniques for controlling inter-AS traffic exiting an Autonomous System (AS) by assigning the traffic to the best egress points (i.e. routers or links) from which the traffic is forwarded to adjacent ASes towards the destinations. In practice, changing network conditions such...

    Provided By University of Sunderland

  • White Papers // May 2012

    Distributed Interference-Aware Admission Control With Soft Resource Allocation for Hybrid MAC in Wireless Mesh Networks

    Supporting Quality of Service (QoS) while fulfilling high efficiency of bandwidth utilization is challenging in wireless mesh networks. To deal with this issue, hybrid Medium Access Control (MAC) protocols are effective candidates because they can achieve QoS support and better resource sharing at the same time. However, in multi-hop communication...

    Provided By University of Sunderland

  • White Papers // May 2012

    Compressive Autonomous Sensing (CASe) for Wideband Spectrum Sensing

    Compressive spectrum sensing techniques present many advantages over traditional spectrum sensing approaches, e.g., low sampling rate, and reduced energy consumption. However, when the spectral sparsity level is unknown, there are two significant challenges. They are: how to choose an appropriate number of measurements, and when to terminate the greedy recovery...

    Provided By University of Sunderland

  • White Papers // May 2012

    Spraying the Replication Probability With Geographic Assistance for Delay Tolerant Networks

    Receiving great interest from the research community, Delay Tolerant Networks (DTNs) are a type of Next Generation Networks (NGNs) proposed to bridge communication in challenged environments. In this paper, the message replication probability is proportionally sprayed for efficient routing mainly under sparse scenario. This methodology is different from the spray...

    Provided By University of Sunderland

  • White Papers // Mar 2012

    Distributed MAC Scheduling Mechanism Based on Resource Reservation for IEEE 802.11e-Based Multi-Hop Wireless Networks

    Multi-hop wireless communication is playing a key role in today's communication networks. Despite several advancements in communication protocols and technologies, QoS provisioning is still a challenging issue in multi-hop wireless communications. In this paper, the authors propose a novel scheduling mechanism based on resource reservation for guaranteeing the QoS performance...

    Provided By University of Sunderland

  • White Papers // Mar 2012

    Energy-Efficiency Based Resource Allocation for the Scalar Broadcast Channel

    Until recently, link adaptation and resource allocation for communication system relied extensively on the spectral efficiency as an optimization criterion. With the emergence of the Energy Efficiency (EE) as a key system design criterion, resource allocation based on EE is becoming of great interest. In this paper, the authors propose...

    Provided By University of Sunderland

  • White Papers // Mar 2012

    Selecting Users in Energy-Efficient Collaborative Spectrum Sensing

    Cognitive radio network is defined as an intelligent wireless communication network that should be able to adaptively reconfigure its communication parameters to meet the demands of the transmission network or the user. In this context one possible way to utilize unused licensed spectrum without interfering with incumbent users is through...

    Provided By University of Sunderland

  • White Papers // Mar 2012

    A Mobility Vector Based Routing Algorithm for Delay Tolerant Networks Using History Geographic Information

    The concept of Delay Tolerant Networks (DTNs) are proposed to facilitate communication in challenged mobile wireless networks using the Store-Carry-Forward (SCF) routing behavior. In this paper, the authors' motivation is to take advantage of geographic routing since it routes message without the knowledge about network topology by using real-time location...

    Provided By University of Sunderland

  • White Papers // Dec 2010

    Deploying IP Multimedia Subsystem (IMS) Services in Future Mobile Networks

    The Third Generation Partnership Project (3GPP) has proposed the Long Term Evolution and System Architecture Evolution (LTE/SAE) as the next stage of technologies aimed at overcoming the limitation in the existing 2G and 3G networks while driving mobile networks towards 4G standardisation. Although a new architecture has been proposed for...

    Provided By University of Sunderland

  • White Papers // Jun 2010

    Energy-Efficient Resource Allocation in Wireless OFDMA Systems

    Reducing the consumed energy in wireless communication systems has a direct impact on operational expenditure as well as CO2 emissions. With increasing interest in multimedia applications and high data rate services, environmentally sustainable communications networks must reduce the energy per delivered bit at an equal rate, if not better. This...

    Provided By University of Sunderland

  • White Papers // Sep 2012

    Plaintext Awareness in Identity-Based Key Encapsulation

    The notion of Plaintext Awareness (PA) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving INdistinguishability against aDaptive Chosen Ciphertext Attacks (IND-CCA), and can be used to construct privacy-preserving protocols such as...

    Provided By University of Sunderland

  • White Papers // Feb 2011

    Energy Aware Transmission in Cellular Uplink with Clustered Base Station Cooperation

    The authors provide an analytical formula to evaluate the performance of the uplink of planar cellular networks when joint processing is enabled among limited number of base stations in a generalised fading environment. Focusing on user transmission power allocation techniques to mitigate inter-cluster interference they investigate the system's spectral-energy efficiency...

    Provided By University of Sunderland

  • White Papers // May 2012

    Performance of Multicell Joint Processing Planar Cellular Uplink in the Presence of Relay Nodes

    In this paper, the authors compare the uplink performance of various deployment scenarios in the planar (hexagonal) cellular system where the received signals at multiple cells are jointly processed by a central processor. A mathematical model of the planar cellular system is presented and its performance metric is based on...

    Provided By University of Sunderland