University of Technology of Troyes

Displaying 1-15 of 15 results

  • White Papers // Jan 2013

    Ontology Services-Based Information Integration in Mining Telecom Business Intelligence

    Ordinary implementation of mining telecom Business Intelligence (BI) is to simply pack Data Warehouse (DW), OLAP and data mining engines together. In practice, this type of system cannot adapt to changing or new requirements emergent in the problem domain. As a result of survey, 85% of DW projects failed to...

    Provided By University of Technology of Troyes

  • White Papers // Dec 2012

    Active Data-Centric Framework for Data Protection in Cloud Environment

    Cloud computing is an emerging evolutionary computing model that provides highly scalable services over high-speed internet on a pay-as-usage model. However, cloud-based solutions still have not been widely deployed in some sensitive areas, such as banking and healthcare. The lack of widespread development is related to users' concern that their...

    Provided By University of Technology of Troyes

  • White Papers // Sep 2012

    Limited Feedback in Wireless Communications and Networks

    It is well-known that adopting adaptive signal transmission in wireless systems can yield significant improvement in almost any performance metric. However, many adaptive communication techniques have been deemed impractical due to the requirement of perfect Channel State Information (CSI) feedback. Limited feedback has been proved to be a promising technique...

    Provided By University of Technology of Troyes

  • White Papers // Jul 2012

    CCBKE - Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing

    Instead of purchasing and maintaining their own computing infrastructure, scientists can now run data-intensive scientific applications in a hybrid environment such as cloud computing by facilitating its vast storage and computation capabilities. During the scheduling of such scientific applications for execution, various computation data flows will happen between the controller...

    Provided By University of Technology of Troyes

  • White Papers // Mar 2012

    A Cellular Automata Hybrid Quasi-Random Monte Carlo Simulation for Estimating the One-to-All Reliability of Acyclic Multi-State Information Networks

    Many real-world systems (such as cellular telephones and transportation) are Acyclic Multi-state Information Networks (AMIN). These networks are composed of multi-state nodes, with different states determined by a set of nodes that receive a signal directly from these multi-state nodes, without satisfying the conservation law. Evaluating the AMIN reliability arises...

    Provided By University of Technology of Troyes

  • White Papers // Jan 2012

    A New Algorithm for Finding All Minimal Cuts in Modified Networks

    Evaluating network reliability is an important topic in the planning, designing and control of network systems. Modifications are common for network expansion or reinforcement evaluation and planning. A modified network is an updated network after inserting a branch string (a special path) between two nodes in the original network. The...

    Provided By University of Technology of Troyes

  • White Papers // Sep 2010

    Agent Strategy Data Gathering for Long Life WSN

    The main goal of Wireless Sensor Networks (WSN) is to gather information from the regions of interest through a large number of micro sensor nodes. This gathering is traditionally done by using a client/server communication approach. However, this communication architecture consumes a lot of power and does not take into...

    Provided By University of Technology of Troyes

  • White Papers // Mar 2010

    Securing Data Transfer in the Cloud Through Introducing Identification Packet and UDT-Authentication Option Field: A Characterization

    The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these protocols are TCP protocol variants, which have demonstrated better performance in simulation and several limited network experiments but have limited practical applications because of...

    Provided By University of Technology of Troyes

  • White Papers // Apr 2009

    Cramer-Rao Bound-Based Adaptive Quantization for Target Tracking in Wireless Sensor Networks

    This paper deals with the problem of target tracking in wireless sensor networks where the observed system is assumed to evolve according to a probabilistic state space model. The authors propose to improve the use of the Variational Filtering (VF) by quantizing the data collected by the sensors to higher...

    Provided By University of Technology of Troyes

  • White Papers // Jan 2009

    Decentralized Variational Filtering for Simultaneous Sensor Localization and Target Tracking in Binary Sensor Networks

    Resource limitations in wireless sensor networks have put stringent constraints on distributed signal processing. In this paper, the authors propose a cluster-based decentralized variational filtering algorithm with minimum resource allocation for simultaneous sensor localization and target tracking. At each sampling instant, only one cluster of sensors is activated according to...

    Provided By University of Technology of Troyes

  • White Papers // Jul 2008

    A Model-Driven Top-Down Approach to Inter-Organizational Systems: From Global Choreography Models to Executable Bpel

    Today, most approaches for inter-organizational business processes start bottom-up from the interfaces and the workflows of each partner described on the IT layer. Alternatively, one may start from the commitments and agreements between business partners to reach their complementary business goals. The latter approach is target of the UN/CEFACT Modeling...

    Provided By University of Technology of Troyes

  • White Papers // May 2008

    Registering UML Models for Global and Local Choreographies

    A local choreography describes how a business partner - from his perspective - interacts with other business partners. If local choreographies are developed in isolation, the local choreographies of different partners will not match. A global choreography, which describes the interactions from a neutral perspective, may serve as an agreement...

    Provided By University of Technology of Troyes

  • White Papers // Feb 2008

    Problem Frames and Business Strategy Modelling

    Requirements engineering describes how an IT implementation will support business functions. Most IT systems are operational in nature and typical requirements engineering techniques and methods are usually adequate in capturing and documenting the requirements for such systems. Jackson's problem frames is a technique that is suitable for straightforward IT systems...

    Provided By University of Technology of Troyes

  • White Papers // Feb 2008

    A UML Profile for Nested Business Collaborations

    Today, most approaches for inter-organizational business processes start bottom-up from the interfaces and the workflows of each partner described on the IT layer. Alternatively, one may start from the commitments and agreements between business partners to reach their complementary business goals. The latter approach is target of the UN/ CEFACT...

    Provided By University of Technology of Troyes

  • White Papers // May 2007

    Business Ethics as Practice

    In this paper, the authors develop a conceptualization of business ethics as practice. Starting from the view that the ethics that organizations display in practice will have been forged through an ongoing process of debate and contestation over moral choices, they examine ethics in relation to the ambiguous, unpredictable, and...

    Provided By University of Technology of Troyes

  • White Papers // Jul 2012

    CCBKE - Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing

    Instead of purchasing and maintaining their own computing infrastructure, scientists can now run data-intensive scientific applications in a hybrid environment such as cloud computing by facilitating its vast storage and computation capabilities. During the scheduling of such scientific applications for execution, various computation data flows will happen between the controller...

    Provided By University of Technology of Troyes

  • White Papers // Mar 2012

    A Cellular Automata Hybrid Quasi-Random Monte Carlo Simulation for Estimating the One-to-All Reliability of Acyclic Multi-State Information Networks

    Many real-world systems (such as cellular telephones and transportation) are Acyclic Multi-state Information Networks (AMIN). These networks are composed of multi-state nodes, with different states determined by a set of nodes that receive a signal directly from these multi-state nodes, without satisfying the conservation law. Evaluating the AMIN reliability arises...

    Provided By University of Technology of Troyes

  • White Papers // Jan 2012

    A New Algorithm for Finding All Minimal Cuts in Modified Networks

    Evaluating network reliability is an important topic in the planning, designing and control of network systems. Modifications are common for network expansion or reinforcement evaluation and planning. A modified network is an updated network after inserting a branch string (a special path) between two nodes in the original network. The...

    Provided By University of Technology of Troyes

  • White Papers // Sep 2012

    Limited Feedback in Wireless Communications and Networks

    It is well-known that adopting adaptive signal transmission in wireless systems can yield significant improvement in almost any performance metric. However, many adaptive communication techniques have been deemed impractical due to the requirement of perfect Channel State Information (CSI) feedback. Limited feedback has been proved to be a promising technique...

    Provided By University of Technology of Troyes

  • White Papers // Sep 2010

    Agent Strategy Data Gathering for Long Life WSN

    The main goal of Wireless Sensor Networks (WSN) is to gather information from the regions of interest through a large number of micro sensor nodes. This gathering is traditionally done by using a client/server communication approach. However, this communication architecture consumes a lot of power and does not take into...

    Provided By University of Technology of Troyes

  • White Papers // Apr 2009

    Cramer-Rao Bound-Based Adaptive Quantization for Target Tracking in Wireless Sensor Networks

    This paper deals with the problem of target tracking in wireless sensor networks where the observed system is assumed to evolve according to a probabilistic state space model. The authors propose to improve the use of the Variational Filtering (VF) by quantizing the data collected by the sensors to higher...

    Provided By University of Technology of Troyes

  • White Papers // Jan 2009

    Decentralized Variational Filtering for Simultaneous Sensor Localization and Target Tracking in Binary Sensor Networks

    Resource limitations in wireless sensor networks have put stringent constraints on distributed signal processing. In this paper, the authors propose a cluster-based decentralized variational filtering algorithm with minimum resource allocation for simultaneous sensor localization and target tracking. At each sampling instant, only one cluster of sensors is activated according to...

    Provided By University of Technology of Troyes

  • White Papers // Mar 2010

    Securing Data Transfer in the Cloud Through Introducing Identification Packet and UDT-Authentication Option Field: A Characterization

    The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these protocols are TCP protocol variants, which have demonstrated better performance in simulation and several limited network experiments but have limited practical applications because of...

    Provided By University of Technology of Troyes

  • White Papers // Feb 2008

    A UML Profile for Nested Business Collaborations

    Today, most approaches for inter-organizational business processes start bottom-up from the interfaces and the workflows of each partner described on the IT layer. Alternatively, one may start from the commitments and agreements between business partners to reach their complementary business goals. The latter approach is target of the UN/ CEFACT...

    Provided By University of Technology of Troyes

  • White Papers // Dec 2012

    Active Data-Centric Framework for Data Protection in Cloud Environment

    Cloud computing is an emerging evolutionary computing model that provides highly scalable services over high-speed internet on a pay-as-usage model. However, cloud-based solutions still have not been widely deployed in some sensitive areas, such as banking and healthcare. The lack of widespread development is related to users' concern that their...

    Provided By University of Technology of Troyes

  • White Papers // Jan 2013

    Ontology Services-Based Information Integration in Mining Telecom Business Intelligence

    Ordinary implementation of mining telecom Business Intelligence (BI) is to simply pack Data Warehouse (DW), OLAP and data mining engines together. In practice, this type of system cannot adapt to changing or new requirements emergent in the problem domain. As a result of survey, 85% of DW projects failed to...

    Provided By University of Technology of Troyes

  • White Papers // Jul 2008

    A Model-Driven Top-Down Approach to Inter-Organizational Systems: From Global Choreography Models to Executable Bpel

    Today, most approaches for inter-organizational business processes start bottom-up from the interfaces and the workflows of each partner described on the IT layer. Alternatively, one may start from the commitments and agreements between business partners to reach their complementary business goals. The latter approach is target of the UN/CEFACT Modeling...

    Provided By University of Technology of Troyes

  • White Papers // May 2008

    Registering UML Models for Global and Local Choreographies

    A local choreography describes how a business partner - from his perspective - interacts with other business partners. If local choreographies are developed in isolation, the local choreographies of different partners will not match. A global choreography, which describes the interactions from a neutral perspective, may serve as an agreement...

    Provided By University of Technology of Troyes

  • White Papers // Feb 2008

    Problem Frames and Business Strategy Modelling

    Requirements engineering describes how an IT implementation will support business functions. Most IT systems are operational in nature and typical requirements engineering techniques and methods are usually adequate in capturing and documenting the requirements for such systems. Jackson's problem frames is a technique that is suitable for straightforward IT systems...

    Provided By University of Technology of Troyes

  • White Papers // May 2007

    Business Ethics as Practice

    In this paper, the authors develop a conceptualization of business ethics as practice. Starting from the view that the ethics that organizations display in practice will have been forged through an ongoing process of debate and contestation over moral choices, they examine ethics in relation to the ambiguous, unpredictable, and...

    Provided By University of Technology of Troyes