University of Trento

Displaying 1-40 of 57 results

  • White Papers // Aug 2012

    CrowdER: Crowdsourcing Entity Resolution

    In the last years there has been a considerable increase in the availability of continuous sensor measurements in a wide range of application domains, such as Location-Based Services (LBS), medical monitoring systems, manufacturing plants and engineering facilities to ensure efficiency, product quality and safety, hydrologic and geologic observing systems, pollution...

    Provided By University of Trento

  • White Papers // Apr 2012

    Towards Business Processes Orchestrating the Physical Enterprise With Wireless Sensor Networks

    The industrial adoption of Wireless Sensor Networks (WSNs) is hampered by two main factors. First, there is a lack of integration of WSNs with business process modeling languages and back-ends. Second, programming WSNs is still challenging as it is mainly performed at the operating system level. To this end, the...

    Provided By University of Trento

  • White Papers // Apr 2012

    Adaptive Workflow Management in the Cloud - Towards a Novel Platform as a Service

    In this paper, a novel workflow platform as a service is presented. The paper describes how existing components of adaptive workflow technology are integrated and extended towards a cloud platform on which individual users as well as small business enterprises may model, execute and adapt workflows without the need to...

    Provided By University of Trento

  • White Papers // Feb 2012

    What Does Model-Driven Data Acquisition Really Achieve in Wireless Sensor Networks?

    Model-driven data acquisition techniques aim at reducing the amount of data reported, and therefore the energy consumed, in Wireless Sensor Networks (WSNs). At each node, a model predicts the sampled data; when the latter deviate from the current model, a new model is generated and sent to the data sink....

    Provided By University of Trento

  • White Papers // Jan 2012

    Time-Driven Switching Blocking Analysis: A Single Node Case

    This paper presents a closed-form time-domain analysis of the blocking probability of Time-Driven Switching (TDS) for the single node case. In this work blocking is defined as the occurrence in which transmission resources are available in both inlet and outlet, but there is no schedule. The main constraints for finding...

    Provided By University of Trento

  • White Papers // Dec 2011

    Privacy in the Pervasive Era: A Distributed Firewall Approach

    This paper presents a novel protocol for the support of audio/video streaming in a vehicular network. The protocol is based on localization and timing, both of them obtained via satellite positioning. Transmissions are coordinated to entirely avoid collisions. The protocol is evaluated using an innovative semi-analytic technique based on stochastic...

    Provided By University of Trento

  • White Papers // Aug 2011

    Composition Theorems without Pre-Established Session Identifiers

    Canetti's universal composition theorem and the joint state composition theorems are useful and widely employed tools for the modular design and analysis of cryptographic protocols. However, these theorems assume that parties participating in a protocol session have pre-established a unique Session ID (SID). While the use of such SIDs is...

    Provided By University of Trento

  • White Papers // Jul 2011

    Cloudy Weather for P2P, With a Chance of Gossip

    Peer-To-Peer (P2P) and cloud computing, two of the Internet trends of the last decade, hold similar promises: the (virtually) infinite availability of computing and storage resources. But there are important differences: the cloud provides highly-available resources, but at a cost; P2P resources are for free, but their availability is shaky....

    Provided By University of Trento

  • White Papers // May 2011

    Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study

    In this paper, the authors present new insights into central properties of voting systems, namely verifiability, privacy, and coercion-resistance. They demonstrate that the combinations of the two forms of verifiability considered in the literature - individual and universal verifiability - are, unlike commonly believed, insufficient to guarantee overall verifiability. They...

    Provided By University of Trento

  • White Papers // May 2011

    Group Monitoring in Mobile Wireless Sensor Networks

    The need to monitor groups of mobile entities arises in many application contexts. Examples include the study of the social behavior of humans and wildlife, the shepherding of livestock, the care giving to people that are not self-sufficient. Human- or animal-borne wireless devices can be used to detect the joining...

    Provided By University of Trento

  • White Papers // May 2011

    Towards the Integration of Knowledge Organization Systems With the Linked Data Cloud

    In representing the shared view of all the people involved, building a Knowledge Organization System (KOS) from scratch is extremely costly, and it is therefore fundamental to reuse existing resources. This can be done by progressively extending the KOS with knowledge coming from similar KOS and by promoting interoperability among...

    Provided By University of Trento

  • White Papers // Jan 2011

    Supporting Publication and Subscription Confidentiality in Pub/Sub Networks

    The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Publisher applications generate events that are sent to interested applications through a network of brokers. Subscriber applications express their interest by specifying filters that brokers can use for routing the events. Supporting confidentiality of messages being...

    Provided By University of Trento

  • White Papers // Jan 2011

    Passive Real-Time Localization Through Wireless Sensor Networks

    Localization and tracking play a key role in several applications both civilian and military. The growing needs of remote monitoring private and public areas caused a fast development of wireless and pervasive systems. In such a framework, the availability of low-power devices integrating on-board processing and wireless communication stimulated several...

    Provided By University of Trento

  • White Papers // Jan 2011

    Optimized Design of a Multi-Function/Multi-Band Antenna for Automotive Rescue Systems

    The development of efficient automotive accident management systems requires the design of complex multi-function antennas enabling different wireless services (e.g., localization, voice and data communications, emergency calls, etc...). Starting from different specifications (electrical, mechanical, and aerodynamic), the design of a multifunction antenna must consider, in addition to the usual antenna...

    Provided By University of Trento

  • White Papers // Jan 2011

    Synthesis and Optimization of Pre-Fractal Multiband Antennas

    The growing demand of electronic products employing several wireless standards for data exchange, working in different frequency bands, requires the adoption of multi-band components and devices. In this framework one of the most critical issue is the design of the radiating device since the development of a single antenna working...

    Provided By University of Trento

  • White Papers // Jan 2011

    Planning and Monitoring Web Service Composition

    The ability to automatically compose web services, and to monitor their execution, is an essential step to substantially decrease time and costs in the development, integration, and maintenance of complex services. This paper exploits techniques based on the "Planning as Model Checking" approach to automatically compose web services and synthesize...

    Provided By University of Trento

  • White Papers // Jan 2011

    Clean Answers Over Dirty Databases: A Probabilistic Approach

    The detection of duplicate tuples, corresponding to the same real-world entity, is an important task in data integration and cleaning. While many techniques exist to identify such tuples, the merging or elimination of duplicates can be a difficult task that relies on ad-hoc and often manual solutions. The authors propose...

    Provided By University of Trento

  • White Papers // Jan 2011

    Managing Wireless HotSpots: The Unify Approach

    This paper presents and discusses user, account, and traffic management in a WLAN based HotSpot. The HotSpot is a large WLAN infrastructure at the Faculty of Science of the University of Trento that uses a novel access management architecture named Uni-Fy developed at the University of Trento, and where roughly...

    Provided By University of Trento

  • White Papers // Dec 2010

    Characterizing User Behavior and Network Load on a Large-Scale Wireless Mesh Network

    Wireless mesh networks represent a promising paradigm to provide a scalable infrastructure for Internet access in metropolitan areas. In this paper, a large-scale wireless mesh testbed deployed in three cities in the Trentino region is described and experimentation results obtained from the public use of the testbed are reported and...

    Provided By University of Trento

  • White Papers // Nov 2010

    GREENET - An Early Stage Training Network in Enabling Technologies for Green Radio

    In this paper, the authors describe GREENET (an early stage training network in enabling technologies for green radio), which is a new project recently funded by the European Commission under the auspices of the 2010 Marie Curie People Programme. Through the recruitment and personalized training of 17 Early Stage Researchers...

    Provided By University of Trento

  • White Papers // Nov 2010

    MUSTER: Adaptive Energy-Aware Multi-Sink Routing in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are increasingly proposed for applications characterized by many-to-many communication, where multiple sources report their data to multiple sinks. Unfortunately, mainstream WSN collection protocols are generally designed to account for a single sink and, dually, WSN multicast protocols optimize communication from a single source. In this paper,...

    Provided By University of Trento

  • White Papers // Nov 2010

    Performance Analysis of Wireless Ad-Hoc Network Based on EDCA IEEE802.11e

    IEEE 802.11e is the enhanced version of the IEEE 802.11 MAC dedicated to provide Quality of Service of wireless network. It supports QoS by the service differentiation and prioritization mechanism. Data traffic receives different priority based on QoS requirements. Fundamentally, applications are divided into four Access Categories (AC). Each AC...

    Provided By University of Trento

  • White Papers // Jun 2010

    GRAPES: A Generic Environment for P2P Streaming

    Practical implementation of new P2P streaming systems require a lot of coding and is often tedious and costly, slowing down the technology transfer from the research community to real users. GRAPES aims at relieving this burden, and speed-up application development, by providing a set of open-source components conceived as basic...

    Provided By University of Trento

  • White Papers // Apr 2010

    Two-Layered Architecture for Peer-to-Peer Concept Search

    Peer-to-peer search is an alternative to address the scalability concerns regarding centralized search, due to its inherent scalability in terms of computational resources. Concept search is an information retrieval approach which is based on retrieval models and data structures of syntactic search, but which searches for concepts rather than words...

    Provided By University of Trento

  • White Papers // Apr 2010

    Architectures and Cross-Layer Design for Cognitive Networks

    Network evolution towards self-aware autonomous adaptive networking attempts to overcome the inefficiency of configuring and managing networks, which leads to performance degradation. In order to optimize network operations, the introduction of self-awareness, self-management, and self-healing into the network was proposed. This created a new paradigm in networking, known as cognitive...

    Provided By University of Trento

  • White Papers // Apr 2010

    Emulating Multi-Hop Wireless Networks Over a Planetary Scale Testbed

    The most commonly used technique to evaluate novel solutions is to leverage on simulation studies which are largely based on a simplified model of the system behavior. Such an approach provides an approximate evaluation of the system's performances, which can be potentially far away from the behavior on a real...

    Provided By University of Trento

  • White Papers // Mar 2010

    Cognitive Information Service: Basic Principles and Implementation of a Cognitive Inter-Node Protocol Optimization Scheme

    Cognitive networks are becoming extremely popular in the network domain. This paper proposes a novel concept in cognitive network management and protocol configuration, where any protocol of the TCP/IP protocol reference model can be extended to dynamically tune its configuration parameters based on "Immediate past" performance. The approach is focused...

    Provided By University of Trento

  • White Papers // Mar 2010

    Reasoning About Contextual Requirements for Mobile Information Systems: A Goal-Based Approach

    Mobile information systems are characterized by their ability to adapt to varying contexts. There is a strong relationship between the requirements of a mobile information system and its operational context. On the one hand, context can be considered to determine the requirements, the alternatives that can be adopted to satisfy...

    Provided By University of Trento

  • White Papers // Feb 2010

    Reviewing Peer Review: A Quantitative Analysis of Peer Review

    In this paper, the authors focus on the analysis of peer reviews and reviewers behavior in a number of different review processes. More specifically, they report on the development, definition and rationale of a theoretical model for peer review processes to support the identification of appropriate metrics to assess the...

    Provided By University of Trento

  • White Papers // Feb 2010

    Contextual Goal Models

    In emerging computing paradigms, such as mobile, ubiquitous, and pervasive computing, the relation between context and requirements is evident. Context might be a main factor to determine the set of requirements relevant to a system, the alternatives that can be adopted to meet these requirements, and the quality of each...

    Provided By University of Trento

  • White Papers // Feb 2010

    A Goal-Based Framework for Contextual Requirements Modeling and Analysis

    Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerging computing paradigms, such as ambient, pervasive and ubiquitous computing, where it is essential to monitor and adapt to an inherently varying context. Besides...

    Provided By University of Trento

  • White Papers // Jan 2010

    When Security Meets Software Engineering: A Case of Modelling

    Although security is a crucial issue for information systems, traditionally, it is considered after the definition of the system. This approach often leads to problems, which most of the times translate into security vulnerabilities. From the viewpoint of the traditional security paradigm, it should be possible to eliminate such problems...

    Provided By University of Trento

  • White Papers // Nov 2009

    WING/WORLD: An Open Experimental Toolkit for the Design and Deployment of IEEE 802.11-Based Wireless Mesh Networks Testbeds

    Wireless Mesh Networks represent an interesting instance of light-infrastructure wireless networks. Due to their flexibility and resiliency to network failures, wireless mesh networks are particularly suitable for incremental and rapid deployments of wireless access networks in both metropolitan and rural areas. This paper illustrates the design and development of an...

    Provided By University of Trento

  • White Papers // Oct 2009

    Cognitive Link Layer for Wireless Local Area Networks

    Several attempts have been made to optimize a link layer of wireless local area networks. Most of them focus on one parameter at a time and propose optimizing approaches which rely on network state information usually not directly available at network nodes. In this paper, the authors propose a cognitive...

    Provided By University of Trento

  • White Papers // Aug 2009

    Achieving Performance and Robustness in P2P Streaming Systems

    This paper present a thorough and homogeneous comparison of chunk and peer selection strategies suitable for mesh-based, live, P2P streaming applications. Strategies are studied in a context of push protocols, and it is shown that none of the schedulers analyzed, which are, to the best of the authors' knowledge, the...

    Provided By University of Trento

  • White Papers // Aug 2009

    Security and Privacy Issues in P2P Streaming Systems: A Survey

    Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the other 'Side' properties that transform an experimental application into a service. Research on security for P2P streaming started to flourish, but no comprehensive security analysis over the...

    Provided By University of Trento

  • White Papers // Jul 2009

    Receiver-Driven Queue Management for Achieving RTT-Fairness in Wi-Fi Networks

    In this paper, the authors introduce a novel queue management technique for the buffer space at the base station of infrastructure 802.11 networks that considers mobile user's receiving characteristics. The maximum amount of the base station buffer that can be used by a given flow is updated proportionally to RTT,...

    Provided By University of Trento

  • White Papers // Jun 2009

    Simulating BDI-Based Wireless Sensor Networks

    Autonomic systems merge advancements in the field of multi-agent software design, dynamic analysis, and decentralized control in order to assist designers in constructing complex distributed systems. Wireless Sensor Networks (WSN) represent such systems, and may benefit from autonomic system designs that target distributed nodes in diverse and changing environments that...

    Provided By University of Trento

  • White Papers // May 2009

    Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology

    Security Requirements Engineering is an emerging field which lies at the crossroads of Security and Software Engineering. Much research has focused on this field in recent years, spurred by the realization that security must be dealt with in the earliest phases of the software development process as these phases cover...

    Provided By University of Trento

  • White Papers // Apr 2009

    The "Credit-cost Channel" Of Monetary Policy. A Theoretical Assessment

    Drawing on the modern literature on the monetary transmission mechanisms with capital market imperfections, this paper presents a model of the "Credit-cost channel" of monetary policy. The thrust of the model is that firms' reliance on bank loans ("Credit channel") may make aggregate supply sensitive to bank interest rates ("Cost...

    Provided By University of Trento

  • White Papers // Nov 2008

    Property Rights And Investments: An Evolutionary Approach

    When contracts are not enforceable, or property rights are not clearly defined, individuals might lack an incentive to carry out costly investments even when they are socially efficient. Some recent contributions such as Ellingsen and Robles (2002) prove that this problem might be less dramatic than standard economic models would...

    Provided By University of Trento

  • White Papers // Nov 2008

    MVSink: Incrementally Building In-Network Aggregation Trees

    In-network data aggregation is widely recognized as an acceptable means to reduce the amount of transmitted data without adversely affecting the quality of the results. To date, most aggregation protocols assume that data from localized regions is correlated, thus they tend to identify aggregation points within these regions. The authors'...

    Provided By University of Trento

  • White Papers // Aug 2008

    Towards Knowledge in the Cloud

    Knowledge in the form of semantic data is becoming more and more ubiquitous, and the need for scalable, dynamic systems to support collaborative work with such distributed, heterogeneous knowledge arises. The authors extend the "Data in the cloud" approach that is emerging today to "Knowledge in the cloud", with support...

    Provided By University of Trento

  • White Papers // Jul 2008

    A Linear Multi-User Detector for STBC MCCDMA Systems Based on the Adaptive Implementation of the Minimum-Conditional Bit- Error-Rate Criterion and on Genetic Algorithmassisted MMSE Channel Estimation

    The implementation of efficient baseband receivers characterized by affordable computational load is a crucial point in the development of transmission systems exploiting diversity in different domains. In this paper, the authors are proposing a linear multi-user detector for MIMO MCCDMA systems with Alamouti's Space-Time Block Coding, inspired by the concept...

    Provided By University of Trento

  • White Papers // Mar 2009

    HyperCBR: Large-Scale Content-Based Routing in a Multidimensional Space

    Content-Based Routing (CBR) is becoming increasingly popular as a building block for distributed applications. CBR differs from classical routing paradigms as messages are routed based on their content rather than their destination address, which fosters decoupling and flexibility in the application's distributed architecture. However, most available systems realize CBR by...

    Provided By University of Trento

  • White Papers // Nov 2009

    WING/WORLD: An Open Experimental Toolkit for the Design and Deployment of IEEE 802.11-Based Wireless Mesh Networks Testbeds

    Wireless Mesh Networks represent an interesting instance of light-infrastructure wireless networks. Due to their flexibility and resiliency to network failures, wireless mesh networks are particularly suitable for incremental and rapid deployments of wireless access networks in both metropolitan and rural areas. This paper illustrates the design and development of an...

    Provided By University of Trento

  • White Papers // May 2011

    Group Monitoring in Mobile Wireless Sensor Networks

    The need to monitor groups of mobile entities arises in many application contexts. Examples include the study of the social behavior of humans and wildlife, the shepherding of livestock, the care giving to people that are not self-sufficient. Human- or animal-borne wireless devices can be used to detect the joining...

    Provided By University of Trento

  • White Papers // Nov 2010

    MUSTER: Adaptive Energy-Aware Multi-Sink Routing in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are increasingly proposed for applications characterized by many-to-many communication, where multiple sources report their data to multiple sinks. Unfortunately, mainstream WSN collection protocols are generally designed to account for a single sink and, dually, WSN multicast protocols optimize communication from a single source. In this paper,...

    Provided By University of Trento

  • White Papers // Jun 2009

    Simulating BDI-Based Wireless Sensor Networks

    Autonomic systems merge advancements in the field of multi-agent software design, dynamic analysis, and decentralized control in order to assist designers in constructing complex distributed systems. Wireless Sensor Networks (WSN) represent such systems, and may benefit from autonomic system designs that target distributed nodes in diverse and changing environments that...

    Provided By University of Trento

  • White Papers // May 2008

    Object Tracking Through RSSI Measurements in Wireless Sensor Networks

    In this paper, the localization of moving and transceiver-free objects is addressed by processing the Received Signal Strength Indicator (RSSI) available at the nodes of a Wireless Sensor Network (WSN). Starting from the RSSI measurements, the probability of the presence of unknown mobile objects is determined by means of a...

    Provided By University of Trento

  • White Papers // Apr 2009

    Efficient Coverage Optimization in Energy-Constrained Wireless Sensor Networks

    The authors consider the problem of optimizing the area coverage of a wireless sensor network under energy consumption constraints. Following existing approaches, they use a mixed integer linear program formulation. They then show how to use partitioning techniques, developed in the context of VLSI place and route, to decompose the...

    Provided By University of Trento

  • White Papers // Jan 2011

    Passive Real-Time Localization Through Wireless Sensor Networks

    Localization and tracking play a key role in several applications both civilian and military. The growing needs of remote monitoring private and public areas caused a fast development of wireless and pervasive systems. In such a framework, the availability of low-power devices integrating on-board processing and wireless communication stimulated several...

    Provided By University of Trento

  • White Papers // May 2011

    Towards the Integration of Knowledge Organization Systems With the Linked Data Cloud

    In representing the shared view of all the people involved, building a Knowledge Organization System (KOS) from scratch is extremely costly, and it is therefore fundamental to reuse existing resources. This can be done by progressively extending the KOS with knowledge coming from similar KOS and by promoting interoperability among...

    Provided By University of Trento

  • White Papers // Jan 2011

    Optimized Design of a Multi-Function/Multi-Band Antenna for Automotive Rescue Systems

    The development of efficient automotive accident management systems requires the design of complex multi-function antennas enabling different wireless services (e.g., localization, voice and data communications, emergency calls, etc...). Starting from different specifications (electrical, mechanical, and aerodynamic), the design of a multifunction antenna must consider, in addition to the usual antenna...

    Provided By University of Trento

  • White Papers // Jan 2011

    Synthesis and Optimization of Pre-Fractal Multiband Antennas

    The growing demand of electronic products employing several wireless standards for data exchange, working in different frequency bands, requires the adoption of multi-band components and devices. In this framework one of the most critical issue is the design of the radiating device since the development of a single antenna working...

    Provided By University of Trento

  • White Papers // May 2008

    Entity Name System: The Back-Bone of an Open and Scalable Web of Data

    Recognizing that information from different sources refers to the same (real world) entity is a crucial challenge in instance-level information integration, as it is a pre-requisite for combining the information about one entity from different sources. The required entity matching is time consuming and thus imposes a crucial limit for...

    Provided By University of Trento

  • White Papers // Sep 2008

    Towards a Quantitative Assessment of Security in Software Architectures

    Software patterns are key building blocks used to construct the architecture of a software system. Patterns also have an important role during the architecture assessment phase, as they represent the design rationale, which is central to evaluation. This paper presents a quantitative approach to assess the security of a pattern-based...

    Provided By University of Trento

  • White Papers // Apr 2012

    Towards Business Processes Orchestrating the Physical Enterprise With Wireless Sensor Networks

    The industrial adoption of Wireless Sensor Networks (WSNs) is hampered by two main factors. First, there is a lack of integration of WSNs with business process modeling languages and back-ends. Second, programming WSNs is still challenging as it is mainly performed at the operating system level. To this end, the...

    Provided By University of Trento

  • White Papers // Dec 2011

    Privacy in the Pervasive Era: A Distributed Firewall Approach

    This paper presents a novel protocol for the support of audio/video streaming in a vehicular network. The protocol is based on localization and timing, both of them obtained via satellite positioning. Transmissions are coordinated to entirely avoid collisions. The protocol is evaluated using an innovative semi-analytic technique based on stochastic...

    Provided By University of Trento

  • White Papers // Aug 2008

    Solving Performance Issues in Anonymization Overlays With a L3 Approach

    Anonymization (Mix) networks are based on the delivery of messages through a sequence of overlay hops devised to avoid end-to-end linkage of the information, thus protecting users' identities (when needed) and privacy. Most Mix networks overlays are based on hops based either on TLS or directly built by proprietary applications....

    Provided By University of Trento

  • White Papers // Apr 2012

    Adaptive Workflow Management in the Cloud - Towards a Novel Platform as a Service

    In this paper, a novel workflow platform as a service is presented. The paper describes how existing components of adaptive workflow technology are integrated and extended towards a cloud platform on which individual users as well as small business enterprises may model, execute and adapt workflows without the need to...

    Provided By University of Trento

  • White Papers // May 2007

    Representation and Structure-Based Similarity Assessment for Agile Workflows

    The author reports the observation that many collaborative tasks in companies can be partly seen as recurrent routines but partly to contain innovation. The dynamics of the market requires workflow management systems that support agile workflows - workflows which are flexible concerning the adaptation to innovations. This paper presents a...

    Provided By University of Trento

  • White Papers // Sep 2006

    Case-Based Support for Collaborative Business

    In this paper, the authors describe the development of the generic collaboration support architecture CAKE incorporating Case-Based Reasoning (CBR). CAKE provides unified access to knowledge available within an organization, and CBR technology is used throughout the system to distribute this knowledge to agents as required. Adaptive workflows and collaboration patterns...

    Provided By University of Trento

  • White Papers // May 2011

    Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study

    In this paper, the authors present new insights into central properties of voting systems, namely verifiability, privacy, and coercion-resistance. They demonstrate that the combinations of the two forms of verifiability considered in the literature - individual and universal verifiability - are, unlike commonly believed, insufficient to guarantee overall verifiability. They...

    Provided By University of Trento

  • White Papers // Aug 2011

    Composition Theorems without Pre-Established Session Identifiers

    Canetti's universal composition theorem and the joint state composition theorems are useful and widely employed tools for the modular design and analysis of cryptographic protocols. However, these theorems assume that parties participating in a protocol session have pre-established a unique Session ID (SID). While the use of such SIDs is...

    Provided By University of Trento

  • White Papers // Sep 2008

    Understanding Modelling Practices in Manufacturing

    This paper is about describing and analysing modelling practices in automotive industry and electronics design. Based on ethnographic observations in modelling sessions in three case studies, the author tried to describe the modelling scope in real work environments. This helped to identify problem areas or areas of change, articulation work...

    Provided By University of Trento

  • White Papers // Jan 2010

    When Security Meets Software Engineering: A Case of Modelling

    Although security is a crucial issue for information systems, traditionally, it is considered after the definition of the system. This approach often leads to problems, which most of the times translate into security vulnerabilities. From the viewpoint of the traditional security paradigm, it should be possible to eliminate such problems...

    Provided By University of Trento

  • White Papers // Jul 2008

    Analyzing Business Continuity Through a Multi-Layers Model

    Business Continuity Management (BCM) is a process to manage risks, emergencies, and recovery plans of an organization during a crisis. It results in a document called Business Continuity Plans (BCP) that specifies the methodology and procedures required to backup and recover the functional unit of a disrupted business. Traditionally, the...

    Provided By University of Trento

  • White Papers // Jan 2011

    Planning and Monitoring Web Service Composition

    The ability to automatically compose web services, and to monitor their execution, is an essential step to substantially decrease time and costs in the development, integration, and maintenance of complex services. This paper exploits techniques based on the "Planning as Model Checking" approach to automatically compose web services and synthesize...

    Provided By University of Trento

  • White Papers // Nov 2010

    Performance Analysis of Wireless Ad-Hoc Network Based on EDCA IEEE802.11e

    IEEE 802.11e is the enhanced version of the IEEE 802.11 MAC dedicated to provide Quality of Service of wireless network. It supports QoS by the service differentiation and prioritization mechanism. Data traffic receives different priority based on QoS requirements. Fundamentally, applications are divided into four Access Categories (AC). Each AC...

    Provided By University of Trento

  • White Papers // Oct 2008

    Product Innovation And Firm Growth: Evidence From The Integrated Circuits Industry

    Applied research on growth and innovation seems to suggest that successful innovations do not significantly enhance firm growth. This paper tests the hypothesis that the level of observation at which applied research is typically conducted hampers identification of a significant association between innovation and sales growth rates. Exploiting a unique...

    Provided By University of Trento

  • White Papers // Jan 2011

    Supporting Publication and Subscription Confidentiality in Pub/Sub Networks

    The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Publisher applications generate events that are sent to interested applications through a network of brokers. Subscriber applications express their interest by specifying filters that brokers can use for routing the events. Supporting confidentiality of messages being...

    Provided By University of Trento

  • White Papers // Jan 2011

    Clean Answers Over Dirty Databases: A Probabilistic Approach

    The detection of duplicate tuples, corresponding to the same real-world entity, is an important task in data integration and cleaning. While many techniques exist to identify such tuples, the merging or elimination of duplicates can be a difficult task that relies on ad-hoc and often manual solutions. The authors propose...

    Provided By University of Trento

  • White Papers // Apr 2010

    Two-Layered Architecture for Peer-to-Peer Concept Search

    Peer-to-peer search is an alternative to address the scalability concerns regarding centralized search, due to its inherent scalability in terms of computational resources. Concept search is an information retrieval approach which is based on retrieval models and data structures of syntactic search, but which searches for concepts rather than words...

    Provided By University of Trento

  • White Papers // Jun 2010

    GRAPES: A Generic Environment for P2P Streaming

    Practical implementation of new P2P streaming systems require a lot of coding and is often tedious and costly, slowing down the technology transfer from the research community to real users. GRAPES aims at relieving this burden, and speed-up application development, by providing a set of open-source components conceived as basic...

    Provided By University of Trento

  • White Papers // Aug 2009

    Achieving Performance and Robustness in P2P Streaming Systems

    This paper present a thorough and homogeneous comparison of chunk and peer selection strategies suitable for mesh-based, live, P2P streaming applications. Strategies are studied in a context of push protocols, and it is shown that none of the schedulers analyzed, which are, to the best of the authors' knowledge, the...

    Provided By University of Trento

  • White Papers // Aug 2009

    Security and Privacy Issues in P2P Streaming Systems: A Survey

    Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the other 'Side' properties that transform an experimental application into a service. Research on security for P2P streaming started to flourish, but no comprehensive security analysis over the...

    Provided By University of Trento

  • White Papers // Jan 2012

    Time-Driven Switching Blocking Analysis: A Single Node Case

    This paper presents a closed-form time-domain analysis of the blocking probability of Time-Driven Switching (TDS) for the single node case. In this work blocking is defined as the occurrence in which transmission resources are available in both inlet and outlet, but there is no schedule. The main constraints for finding...

    Provided By University of Trento

  • White Papers // Dec 2008

    On the Optimal Scheduling of Streaming Applications in Unstructured Meshes

    P2P streaming and in particular P2P support for IP-TV are becoming not only hot research topics, but also available systems and services. Fundamental to support live streaming is the guarantee of a low distribution delay of the information to all peers. This is strictly related to the overlay characteristics and...

    Provided By University of Trento

  • White Papers // Nov 2010

    GREENET - An Early Stage Training Network in Enabling Technologies for Green Radio

    In this paper, the authors describe GREENET (an early stage training network in enabling technologies for green radio), which is a new project recently funded by the European Commission under the auspices of the 2010 Marie Curie People Programme. Through the recruitment and personalized training of 17 Early Stage Researchers...

    Provided By University of Trento