University of the Aegean

Displaying 1-16 of 16 results

  • White Papers // Mar 2012

    Radio Resource Allocation Algorithms for Multi-Service OFDMA Networks: The Uniform Power Loading Scenario

    Adaptive Radio Resource Allocation is essential for guaranteeing high bandwidth and power utilization as well as satisfying heterogeneous Quality-of-Service requests regarding next generation broadband multicarrier wireless access networks like LTE and Mobile WiMAX. A downlink OFDMA single-cell scenario is considered where heterogeneous Constant-Bit-Rate and Best-Effort QoS profiles coexist and the...

    Provided By University of the Aegean

  • White Papers // Feb 2011

    Situation Awareness Mechanisms for Wireless Sensor Networks

    A wireless sensor network is supposed to be able to operate for long periods of time with little or no external management. There is a requirement for this autonomy: the sensor nodes must be able to configure themselves in presence of adverse situations. Therefore, the nodes should make use of...

    Provided By University of the Aegean

  • White Papers // Jan 2011

    Performance Evaluation of a Flooding Detection Mechanism for VoIP Networks

    The Internet based Telephony services (IPTel) are mainly exposed to set of vulnerabilities that inherited from the employed protocols such as TCP/IP and proprietary VoIP protocols. One of the most critical threats in this sensitive environments is considered the Denial of Service (DoS) attacks. The main concern of a mechanism...

    Provided By University of the Aegean

  • White Papers // Dec 2010

    An Experimental Approach for Optimising Mobile Agent Migrations

    The field of Mobile Agent (MA) technology has been intensively researched during the past few years, resulting in the phenomenal proliferation of available MA platforms, all sharing several common design characteristics. Research projects have mainly focused on identifying applications where the employment of MAs is preferable compared to centralised or...

    Provided By University of the Aegean

  • White Papers // Jul 2010

    Analysis of the Hidden and Exposed Terminal Effects in Wireless Networks With Cooperative ARQ

    Cooperative Automatic Retransmission ReQuest (C-ARQ) schemes allow those users which overhear a transmission to act as spontaneous relays when a packet has been received with errors at destination. When these users assist a source-destination pair in the retransmission process, the area exposed to the original transmission increases in comparison with...

    Provided By University of the Aegean

  • White Papers // Apr 2010

    An Ontology Based-Policy for Deploying Secure SIP- Based VoIP Services

    Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the Internet, raises several security issues that must be accounted for. On top of that, there are new sophisticated attacks against VoIP infrastructures that capitalize on vulnerabilities...

    Provided By University of the Aegean

  • White Papers // Feb 2010

    High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation

    SIP is rapidly becoming a standard for service integration within a variety of wireless and wireline networks. In this regard high availability, reliability and redundancy are key factors for any SIP based infrastructure. In an adverse environment, especially the Internet and foreseeable 3GPP IMS, high availability solutions are of major...

    Provided By University of the Aegean

  • White Papers // Jan 2010

    Testing Cooperative Communication Schemes in a Virtual Distributed Testbed of Wireless Networks

    It is expected that Next Generation Networks (NGNs) will offer seamless interoperability among heterogeneous access technologies in order to provide ubiquitous access. In such settings, short range technologies may be used in order to extend the coverage area of cellular systems while cooperative diversity can improve the efficiency of the...

    Provided By University of the Aegean

  • White Papers // Sep 2009

    Museum Shops: Experiences Gained From Developing Electronic and Mobile Commerce Solutions

    The phenomenal success of the web provides museum organizations an ideal medium for communication, documentation, promotion, advertisement, dissemination of cultural activities and marketing. Museum shops, which nowadays represent integral parts of the museums, have also a lot to benefit from a successful presence on the web arena. In addition to...

    Provided By University of the Aegean

  • White Papers // Sep 2009

    Effective Determination of Mobile Agent Itineraries for Data Aggregation on Sensor Networks

    A key feature of Wireless Sensor Networks (WSN) is the collaborative processing where the correlation existing over the local data of Sensor Nodes (SNs) is exploited so that the total data volume can be reduced (data aggregation). The use of Mobile Agents (MA) i.e. software entities able of migrating among...

    Provided By University of the Aegean

  • White Papers // Aug 2009

    Experimental Performance Evaluation of a MAC Protocol for Cooperative ARQ Scenarios

    This paper provides details and performance evaluation of the implementation of the Persistent Relay Carrier Sensing Multiple Access (PRCSMA) protocol for Cooperative ARQ (C-ARQ) scenarios using off-the-shelf wireless cards. The underlying idea of PRCSMA is to modify the basic rules of the IEEE 802.11 MAC protocol to execute a distributed...

    Provided By University of the Aegean

  • White Papers // Aug 2009

    Performance Analysis of IEEE 802.11 Ad Hoc Networks With Cooperative ARQ in the Presence of Hidden and Exposed Terminals

    The authors present in this paper the analysis of an IEEE 802.11 network in the presence of hidden and exposed terminals when a Cooperative ARQ (C-ARQ) scheme is executed at the MAC layer. When spontaneous helpers transmit to assist in a failed transmission, the area exposed to the original transmission...

    Provided By University of the Aegean

  • White Papers // Jun 2009

    Mobile Sinks for Information Retrieval From Cluster-Based WSN Islands

    Mobile Sinks (MS) mounted upon urban vehicles with fixed trajectories (e.g. buses) provide the ideal infrastructure to effectively retrieve sensory data from isolated Wireless Sensor Network (WSN) fields. Existing approaches involve either single-hop transfer of data from sensors that lie within the MS's range or heavy involvement of network periphery...

    Provided By University of the Aegean

  • White Papers // Nov 2008

    Cultural Applications for Mobile Devices: Issues and Requirements for Authoring Tools and Development Platforms

    This paper explores requirements that authoring tools and development platforms should satisfy for the development of cultural applications tailored for deployment on Personal Digital Assistants (PDAs) and mobile phones. To effectively determine such requirements the paper reviews the use of mobile technologies in the context of cultural organizations and tourism...

    Provided By University of the Aegean

  • White Papers // Sep 2008

    Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections

    Data mining technology raises concerns about the handling and use of sensitive information, especially in highly distributed environments where the participants in the system may by mutually mistrustful. In this paper, the authors argue in favor of using some well-known cryptographic primitives, borrowed from the literature on large-scale Internet elections,...

    Provided By University of the Aegean

  • White Papers // Jun 2008

    Evaluation of Mobile Tourist Guides

    Mobile guides have been in the spot light for the past decade or so they are becoming excessively available to tourists visiting places around the world. Most of which are to be used via a network connection on a browser based device and others as such as proprietary mobile applications,...

    Provided By University of the Aegean

  • White Papers // Apr 2010

    An Ontology Based-Policy for Deploying Secure SIP- Based VoIP Services

    Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the Internet, raises several security issues that must be accounted for. On top of that, there are new sophisticated attacks against VoIP infrastructures that capitalize on vulnerabilities...

    Provided By University of the Aegean

  • White Papers // Jan 2011

    Performance Evaluation of a Flooding Detection Mechanism for VoIP Networks

    The Internet based Telephony services (IPTel) are mainly exposed to set of vulnerabilities that inherited from the employed protocols such as TCP/IP and proprietary VoIP protocols. One of the most critical threats in this sensitive environments is considered the Denial of Service (DoS) attacks. The main concern of a mechanism...

    Provided By University of the Aegean

  • White Papers // Dec 2010

    An Experimental Approach for Optimising Mobile Agent Migrations

    The field of Mobile Agent (MA) technology has been intensively researched during the past few years, resulting in the phenomenal proliferation of available MA platforms, all sharing several common design characteristics. Research projects have mainly focused on identifying applications where the employment of MAs is preferable compared to centralised or...

    Provided By University of the Aegean

  • White Papers // Feb 2011

    Situation Awareness Mechanisms for Wireless Sensor Networks

    A wireless sensor network is supposed to be able to operate for long periods of time with little or no external management. There is a requirement for this autonomy: the sensor nodes must be able to configure themselves in presence of adverse situations. Therefore, the nodes should make use of...

    Provided By University of the Aegean

  • White Papers // Sep 2009

    Effective Determination of Mobile Agent Itineraries for Data Aggregation on Sensor Networks

    A key feature of Wireless Sensor Networks (WSN) is the collaborative processing where the correlation existing over the local data of Sensor Nodes (SNs) is exploited so that the total data volume can be reduced (data aggregation). The use of Mobile Agents (MA) i.e. software entities able of migrating among...

    Provided By University of the Aegean

  • White Papers // Sep 2009

    Museum Shops: Experiences Gained From Developing Electronic and Mobile Commerce Solutions

    The phenomenal success of the web provides museum organizations an ideal medium for communication, documentation, promotion, advertisement, dissemination of cultural activities and marketing. Museum shops, which nowadays represent integral parts of the museums, have also a lot to benefit from a successful presence on the web arena. In addition to...

    Provided By University of the Aegean

  • White Papers // Nov 2008

    Cultural Applications for Mobile Devices: Issues and Requirements for Authoring Tools and Development Platforms

    This paper explores requirements that authoring tools and development platforms should satisfy for the development of cultural applications tailored for deployment on Personal Digital Assistants (PDAs) and mobile phones. To effectively determine such requirements the paper reviews the use of mobile technologies in the context of cultural organizations and tourism...

    Provided By University of the Aegean

  • White Papers // Jun 2009

    Mobile Sinks for Information Retrieval From Cluster-Based WSN Islands

    Mobile Sinks (MS) mounted upon urban vehicles with fixed trajectories (e.g. buses) provide the ideal infrastructure to effectively retrieve sensory data from isolated Wireless Sensor Network (WSN) fields. Existing approaches involve either single-hop transfer of data from sensors that lie within the MS's range or heavy involvement of network periphery...

    Provided By University of the Aegean

  • White Papers // Jun 2008

    Evaluation of Mobile Tourist Guides

    Mobile guides have been in the spot light for the past decade or so they are becoming excessively available to tourists visiting places around the world. Most of which are to be used via a network connection on a browser based device and others as such as proprietary mobile applications,...

    Provided By University of the Aegean

  • White Papers // Jul 2010

    Analysis of the Hidden and Exposed Terminal Effects in Wireless Networks With Cooperative ARQ

    Cooperative Automatic Retransmission ReQuest (C-ARQ) schemes allow those users which overhear a transmission to act as spontaneous relays when a packet has been received with errors at destination. When these users assist a source-destination pair in the retransmission process, the area exposed to the original transmission increases in comparison with...

    Provided By University of the Aegean

  • White Papers // Feb 2010

    High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation

    SIP is rapidly becoming a standard for service integration within a variety of wireless and wireline networks. In this regard high availability, reliability and redundancy are key factors for any SIP based infrastructure. In an adverse environment, especially the Internet and foreseeable 3GPP IMS, high availability solutions are of major...

    Provided By University of the Aegean

  • White Papers // Aug 2009

    Experimental Performance Evaluation of a MAC Protocol for Cooperative ARQ Scenarios

    This paper provides details and performance evaluation of the implementation of the Persistent Relay Carrier Sensing Multiple Access (PRCSMA) protocol for Cooperative ARQ (C-ARQ) scenarios using off-the-shelf wireless cards. The underlying idea of PRCSMA is to modify the basic rules of the IEEE 802.11 MAC protocol to execute a distributed...

    Provided By University of the Aegean

  • White Papers // Aug 2009

    Performance Analysis of IEEE 802.11 Ad Hoc Networks With Cooperative ARQ in the Presence of Hidden and Exposed Terminals

    The authors present in this paper the analysis of an IEEE 802.11 network in the presence of hidden and exposed terminals when a Cooperative ARQ (C-ARQ) scheme is executed at the MAC layer. When spontaneous helpers transmit to assist in a failed transmission, the area exposed to the original transmission...

    Provided By University of the Aegean

  • White Papers // Jan 2010

    Testing Cooperative Communication Schemes in a Virtual Distributed Testbed of Wireless Networks

    It is expected that Next Generation Networks (NGNs) will offer seamless interoperability among heterogeneous access technologies in order to provide ubiquitous access. In such settings, short range technologies may be used in order to extend the coverage area of cellular systems while cooperative diversity can improve the efficiency of the...

    Provided By University of the Aegean

  • White Papers // Mar 2012

    Radio Resource Allocation Algorithms for Multi-Service OFDMA Networks: The Uniform Power Loading Scenario

    Adaptive Radio Resource Allocation is essential for guaranteeing high bandwidth and power utilization as well as satisfying heterogeneous Quality-of-Service requests regarding next generation broadband multicarrier wireless access networks like LTE and Mobile WiMAX. A downlink OFDMA single-cell scenario is considered where heterogeneous Constant-Bit-Rate and Best-Effort QoS profiles coexist and the...

    Provided By University of the Aegean

  • White Papers // Sep 2008

    Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections

    Data mining technology raises concerns about the handling and use of sensitive information, especially in highly distributed environments where the participants in the system may by mutually mistrustful. In this paper, the authors argue in favor of using some well-known cryptographic primitives, borrowed from the literature on large-scale Internet elections,...

    Provided By University of the Aegean