University of Twente

Displaying 1-40 of 44 results

  • White Papers // Dec 2012

    An Optimal Query Assignment for Wireless Sensor Networks

    With the increased use of large-scale real-time embedded sensor networks, new control mechanisms are needed to avoid congestion and meet required Quality of Service (QoS) levels. In this paper, the authors propose a Markov Decision Problem (MDP) to prescribe an optimal query assignment strategy that achieves a trade-off between two...

    Provided By University of Twente

  • White Papers // Apr 2012

    The Impact of Enterprise Resource Planning Implementation Phases on the Task-Technology Fit

    A successful implementation of an Enterprise Resource Planning (ERP) is extremely important to future competitive strategy of a company. The ERP success can be measured as its reliability and utility perceived by users, which are dimensions of the so-called task-technology fit model. The data collected from four selected companies allowed...

    Provided By University of Twente

  • White Papers // Jan 2012

    Tag Clouds and Retrieved Results: The CloudCredo Mobile Clustering Engine and Its Evaluation

    The authors discuss the use of tag clouds as a way of visualizing the results of a clustering search engine. They briefly present a specific tag cloud approach and its implementation in the CloudCredo prototype. Then, they describe an experimental user study aimed at demonstrating that tag cloud visualization is:...

    Provided By University of Twente

  • White Papers // Jan 2012

    Transaction-Based Communication-Centric Debug

    The behaviour of Systems On Chip (SOC) is complex because they contain multiple processors that interact through concurrent interconnects, such as Networks On Chip (NOC). Debugging such SOCs is hard. Based on a classification of debug scope and granularity, the authors propose that debugging should be communication-centric and based on...

    Provided By University of Twente

  • White Papers // Sep 2011

    Scheduler-Specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification

    Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables and the scheduling policy. Several formal definitions of observational determinism exist, but...

    Provided By University of Twente

  • White Papers // Aug 2011

    Scheduler-Related Confidentiality for Multi-Threaded Programs

    Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables. Several formal definitions of observational determinism exist, but all of them have...

    Provided By University of Twente

  • White Papers // Jun 2011

    Improving the Ultra-Low-Power Performance of IEEE 802.15.6 by Adaptive Synchronisation

    In ultra-low data rate Wireless Sensor Networks (WSNs) waking up just to listen to a beacon every superframe can be a major waste of energy. This study introduces MedMAC, a medium access protocol for ultra-low data rate WSNs that achieves significant energy efficiency through a novel synchronisation mechanism. The new...

    Provided By University of Twente

  • White Papers // Jun 2011

    Side-View Face Recognition

    As a widely used biometrics, face recognition has many advantages such as being non-intrusive, natural and passive. On the other hand, in real-life scenarios with uncontrolled environment, pose variation up to side-view positions makes face recognition a challenging work. In this paper, the authors discuss the use of side-view face...

    Provided By University of Twente

  • White Papers // May 2011

    Queueing Analysis of Wireless Network Coding

    The authors consider a wireless communication device that uses network coding and acts as a relay for two connections. They analyze a two-dimensional continuous-time queueing model of the system and show that steady-state performance can be expressed in the solution of a Riemann-Hilbert boundary value problem. From this solution they...

    Provided By University of Twente

  • White Papers // May 2011

    Energy-Delay Tradeoff in Wireless Network Coding

    A queueing model for wireless communication network in which network coding is employed is introduced. It is shown that networks with coding are closely related to queueing networks with positive and negative customers. Analytical upper and lower bounds on the energy consumption and the delay are obtained using a Markov...

    Provided By University of Twente

  • White Papers // Apr 2011

    D-SAR: A Distributed Scheduling Algorithm for Real-Time, Closed-Loop Control in Industrial Wireless Sensor and Actuator Networks

    Current wireless standards and protocols for industrial applications such as WirelessHART and ISA100.11a typically use centralized network management techniques for communication scheduling and route establishment. However, large-scale centralized systems can have several drawbacks. They have difficulty in coping with disturbances or changes within the network in real-time. Large-scale centralized systems...

    Provided By University of Twente

  • White Papers // Apr 2011

    Analysis Methodology for Flow-Level Evaluation of a Hybrid Mobile-Sensor Network

    The society uses a large diversity of co-existing wired and wireless networks in order to satisfy its communication needs. Cooperation between these networks can benefit performance, service availability and deployment ease, and leads to the emergence of hybrid networks. This position paper focuses on a hybrid mobile-sensor network identifying potential...

    Provided By University of Twente

  • White Papers // Mar 2011

    Representing Humans in System Security Models: An Actor-Network Approach

    System models to assess the vulnerability of information systems to security threats typically represent a physical infrastructure (buildings) and a digital infrastructure (computers and networks), in combination with an attacker traversing the system while acquiring credentials. Other humans are generally not included, as their behavior is considered more difficult to...

    Provided By University of Twente

  • White Papers // Mar 2011

    Scheduler-Dependent Inter-Cell Interference and Its Impact on LTE Uplink Performance at Flow Level

    The Long Term Evolution (LTE) cellular technology is expected to extend the capacity and improve the performance of current 3G cellular networks. Among the key mechanisms in LTE responsible for traffic management is the packet scheduler, which handles the allocation of resources to active flows in both the frequency and...

    Provided By University of Twente

  • White Papers // Feb 2011

    Permission-Based Separation Logic for Multithreaded Java Programs

    This paper motivates and presents a program logic for reasoning about multithreaded Java-like programs with concurrency primitives such as dynamic thread creation, thread joining and reentrant object monitors. The logic is based on concurrent separation logic. It is the first detailed adaptation of concurrent separation logic to a multi-threaded Java-like...

    Provided By University of Twente

  • White Papers // Dec 2010

    LTE Uplink Scheduling - Flow Level Analysis

    Long Term Evolution (LTE) is a cellular technology developed to support data traffic at potentially high rates. It is foreseen to extend the capacity and improve the performance of current 3G cellular networks. A key mechanism in the LTE traffic handling is the packet scheduler, which is in charge of...

    Provided By University of Twente

  • White Papers // Nov 2010

    Benefits of Location-Based Access Control: A Literature Study

    Location-Based Access Control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been investigated thoroughly. To this end, the...

    Provided By University of Twente

  • White Papers // Sep 2010

    Automatic Recognition of Object Use Based on Wireless Motion Sensors

    In this paper, the authors present a method for automatic, online detection of a user's interaction with objects. This represents an essential building block for improving the performance of distributed activity recognition systems. The method is based on correlating features extracted from motion sensors worn by the user and attached...

    Provided By University of Twente

  • White Papers // Aug 2010

    COM-LOC++: A Distributed Range-Free Localization Algorithm in Wireless Networks

    This paper introduces a new localization algorithm called COM-LOC++ that improves the performance of a recently introduced distributed range-free algorithm called COM-LOC. COM-LOC and other existing range-free algorithms only process the information received from one reference node in order to estimate the distance to that reference node. COM-LOC++ improves this...

    Provided By University of Twente

  • White Papers // Aug 2010

    When Is It The Right Time To Change? A Case Study Of Implementing A New Activity In An Existing Business Relationship

    Scholars have argued that past experience in business relationships can impede the implementation of new activities. In this paper, the authors apply a practice-based perspective on time (Orlikowski & Yates, 2002) and examine how time and timing of change of temporal structures in business relationships are related to the implementation...

    Provided By University of Twente

  • White Papers // Aug 2010

    Consortial Benchmarking: A Method Of Academic-Practitioner Collaborative Research And Its Application In A B2B Environment

    The purpose of this paper is to develop a new method for academic-practitioner collaboration, addressing the literature on collaborative research. The research method involves model elaboration and test with an in-depth case study. In consortial benchmarking, practitioners and academic researchers form a consortium and together benchmark best-practices firms. Consortial benchmarking...

    Provided By University of Twente

  • White Papers // Aug 2010

    Unveiling The Importance Of Being A Preferred Customer In Order To Develop Innovations With Suppliers

    The purpose of this research is to understand why early supplier integration in new product development repeatedly fails and how to select the right suppliers to avoid supplier obstructionism. The authors review the literature on early supplier integration. They conducted a consortial benchmarking study, involving seven firms as part of...

    Provided By University of Twente

  • White Papers // Jul 2010

    Spectral Minutiae Representations for Fingerprint Recognition

    The spectral minutiae representation introduced in this paper is a novel method to represent a minutiae set as a fixed-length feature vector, which is invariant to translation, and in which rotation becomes translation that can be easily compensated for. These characteristics enable the combination of fingerprint recognition systems with a...

    Provided By University of Twente

  • White Papers // Jun 2010

    Stakeholder Interactions to Support Service Creation in Cloud Computing

    Cloud computing is already a major trend in IT. Cloud services are being offered at application (software), platform and infrastructure levels. This paper presents the authors' initial modeling efforts towards service creation at the infrastructure level. The purpose of these modeling efforts is to understand and reason about the service...

    Provided By University of Twente

  • White Papers // Jun 2010

    A Graph-Based Aspect Interference Detection Approach for UML-Based Aspect-Oriented Models

    Aspect Oriented Modeling (AOM) techniques facilitate separate modeling of concerns and allow for a more flexible composition of the resulting models than traditional techniques. While this improves the understandability of each sub-model, in order to reason about the behavior of the composed system and to detect conflicts among sub-models, automated...

    Provided By University of Twente

  • White Papers // Jun 2010

    Concern-Based Assessment of Architectural Stability: A Comparative Study

    A concern is any consideration that can impact the software architecture and other artefacts. Sustaining stability of concerns realised in architectural designs is essential to obtain long-lasting software products. It is often assumed that concern assessment mechanisms are effective to predict architecture stability. They are ought to exert a positive...

    Provided By University of Twente

  • White Papers // May 2010

    Cloud Computing & Confidentially

    Cloud computing is an upcoming paradigm that offers tremendous advantages in economical aspects, such as reduced time to market, flexible computing capabilities, and limitless computing power. To use the full potential of cloud computing, data is transferred, processed and stored by external cloud providers. However, data owners are very skeptical...

    Provided By University of Twente

  • White Papers // May 2010

    Scheduling Strategies for LTE Uplink With Flow Behaviour Analysis

    Long Term Evolution (LTE) is a cellular technology developed to support diversity of data traffic at potentially high rates. It is foreseen to extend the capacity and improve the performance of current 3G cellular networks. A key mechanism in the LTE traffic handling is the packet scheduler, which is in...

    Provided By University of Twente

  • White Papers // Feb 2010

    Sensitivity Analysis of the Optimal Parameter Settings of an LTE Packet Scheduler

    Advanced packet scheduling schemes in 3G/3G+ mobile networks provide one or more parameters to optimise the trade-off between QoS and resource efficiency. In this paper, the authors study the sensitivity of the optimal parameter setting for packet scheduling in LTE radio networks with respect to various traffic and environment aspects....

    Provided By University of Twente

  • White Papers // Jan 2010

    Using P3P in a Web Services-Based Context-Aware Application Platform

    This paper describes a proposal for privacy control architecture to be applied in the WASP project. The WASP project aims to develop a context-aware service platform on top of 3G networks, using web services technology. The proposed privacy control architecture is based on the P3P privacy policy description standard defined...

    Provided By University of Twente

  • White Papers // Dec 2009

    Distributed Branching Bisimulation Minimization by Inductive Signatures

    The idea of distributed model checking of very large systems, is to store the state space in the collective memory of a cluster of workstations, and employ parallel algorithms to analyze the graph. One approach is to generate the graph in a distributed way, and on-the-fly (i.e. during generation) run...

    Provided By University of Twente

  • White Papers // Aug 2009

    Performance of Relay-Enabled Uplink in Cellular Networks - A Flow Level Analysis

    Uplink users in cellular networks, such as UMTS/HSPA, located at the edge of the cell generally suffer from poor channel conditions. Deploying intermediate relay nodes is seen as a promising approach towards extending cell coverage and increasing data rates. This paper focuses on the role of packet scheduling in cellular...

    Provided By University of Twente

  • White Papers // Aug 2009

    Dynamic Workload Peak Detection for Slack Management

    In this paper an analytical study on dynamism and possibilities on slack exploitation by dynamic power management is presented. The authors introduce a specific workload decomposition method for work required for (streaming) application processing data tokens (e.g. video frames) with work behavior patterns as a mix of periodic and a...

    Provided By University of Twente

  • White Papers // Jun 2009

    Security Implications of Virtualization: A Literature Study

    Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today's network connections, more and more businesses and individuals store their data remotely. Server virtualization is an important technology to facilitate this process, allowing dedicated hardware to be turned...

    Provided By University of Twente

  • White Papers // May 2009

    A Formal Connection Between Security Automata and JML Annotations

    Security automata are a convenient way to describe security policies. Their typical use is to monitor the execution of an application, and to interrupt it as soon as the security policy is violated. However, run-time adherence checking is not always convenient. Instead, the authors aim at developing a technique to...

    Provided By University of Twente

  • White Papers // May 2009

    Scheduler Dependent Modeling of Inter-Cell Interference in UMTS EUL

    In this paper, the authors analyze the performance of the UMTS Enhanced UpLink (EUL) in a network scenario, under various packet scheduling schemes. Besides the impact of the intrinsic differences of the scheduling schemes on EUL performance (which they studied in a previous paper for a single cell scenario), they...

    Provided By University of Twente

  • White Papers // May 2009

    Analyzing the Impact of Relay Station Characteristics on Uplink Performance in Cellular Networks

    Uplink users in cellular networks, such as UMTS/HSPA, located at the edge of the cell generally suffer from poor channel conditions. Deploying intermediate relay nodes is seen as a promising approach towards extending cell coverage. This paper focuses on the role of packet scheduling in cellular networks with relay nodes....

    Provided By University of Twente

  • White Papers // Apr 2009

    Hyperellipsoidal SVM-Based Outlier Detection Technique for GeoSensor Networks

    Recently, wireless sensor networks providing fine-grained spatio-temporal observations have become one of the major monitoring platforms for geo-applications. Along side data acquisition, outlier detection is essential in geosensor networks to ensure data quality, secure monitoring and reliable detection of interesting and critical events. A key challenge for outlier detection in...

    Provided By University of Twente

  • White Papers // Jan 2009

    A Cross-Layered Communication Protocol for Load Balancing in Large Scale Multi-Sink Wireless Sensor Networks

    One of the fundamental operations in sensor networks is convergecast which refers to the communication pattern in which data is collected from a set of sensor nodes and forwarded to a common end-point gateway, namely sink node, in the network. In case of multiple sinks within the network, the total...

    Provided By University of Twente

  • White Papers // Jan 2009

    Implementation of an On-Demand Routing Protocol for Wireless Sensor Networks

    This paper presents their experiences in implementing and validating the on-demand EYES Source Routing protocol (ESR) in a real Wireless Sensor Network (WSN) environment. ESR has a fast recovery mechanism relying on MAC layer feedback to overcome frequent network topology changes resulting from node mobility and unreliability. A geographically restricted...

    Provided By University of Twente

  • White Papers // May 2011

    Energy-Delay Tradeoff in Wireless Network Coding

    A queueing model for wireless communication network in which network coding is employed is introduced. It is shown that networks with coding are closely related to queueing networks with positive and negative customers. Analytical upper and lower bounds on the energy consumption and the delay are obtained using a Markov...

    Provided By University of Twente

  • White Papers // May 2011

    Queueing Analysis of Wireless Network Coding

    The authors consider a wireless communication device that uses network coding and acts as a relay for two connections. They analyze a two-dimensional continuous-time queueing model of the system and show that steady-state performance can be expressed in the solution of a Riemann-Hilbert boundary value problem. From this solution they...

    Provided By University of Twente

  • White Papers // Aug 2010

    COM-LOC++: A Distributed Range-Free Localization Algorithm in Wireless Networks

    This paper introduces a new localization algorithm called COM-LOC++ that improves the performance of a recently introduced distributed range-free algorithm called COM-LOC. COM-LOC and other existing range-free algorithms only process the information received from one reference node in order to estimate the distance to that reference node. COM-LOC++ improves this...

    Provided By University of Twente

  • White Papers // Sep 2010

    Automatic Recognition of Object Use Based on Wireless Motion Sensors

    In this paper, the authors present a method for automatic, online detection of a user's interaction with objects. This represents an essential building block for improving the performance of distributed activity recognition systems. The method is based on correlating features extracted from motion sensors worn by the user and attached...

    Provided By University of Twente

  • White Papers // Feb 2010

    Sensitivity Analysis of the Optimal Parameter Settings of an LTE Packet Scheduler

    Advanced packet scheduling schemes in 3G/3G+ mobile networks provide one or more parameters to optimise the trade-off between QoS and resource efficiency. In this paper, the authors study the sensitivity of the optimal parameter setting for packet scheduling in LTE radio networks with respect to various traffic and environment aspects....

    Provided By University of Twente

  • White Papers // Oct 2008

    Outlier Detection Techniques for Wireless Sensor Networks: A Survey

    In the field of wireless sensor networks, measurements that significantly deviate from the normal pattern of sensed data are considered as outliers. The potential sources of outliers include noise and errors, events, and malicious attacks on the network. Traditional outlier detection techniques are not directly applicable to wireless sensor networks...

    Provided By University of Twente

  • White Papers // Jun 2010

    Stakeholder Interactions to Support Service Creation in Cloud Computing

    Cloud computing is already a major trend in IT. Cloud services are being offered at application (software), platform and infrastructure levels. This paper presents the authors' initial modeling efforts towards service creation at the infrastructure level. The purpose of these modeling efforts is to understand and reason about the service...

    Provided By University of Twente

  • White Papers // Apr 2011

    Analysis Methodology for Flow-Level Evaluation of a Hybrid Mobile-Sensor Network

    The society uses a large diversity of co-existing wired and wireless networks in order to satisfy its communication needs. Cooperation between these networks can benefit performance, service availability and deployment ease, and leads to the emergence of hybrid networks. This position paper focuses on a hybrid mobile-sensor network identifying potential...

    Provided By University of Twente

  • White Papers // Jan 2009

    A Cross-Layered Communication Protocol for Load Balancing in Large Scale Multi-Sink Wireless Sensor Networks

    One of the fundamental operations in sensor networks is convergecast which refers to the communication pattern in which data is collected from a set of sensor nodes and forwarded to a common end-point gateway, namely sink node, in the network. In case of multiple sinks within the network, the total...

    Provided By University of Twente

  • White Papers // May 2010

    Scheduling Strategies for LTE Uplink With Flow Behaviour Analysis

    Long Term Evolution (LTE) is a cellular technology developed to support diversity of data traffic at potentially high rates. It is foreseen to extend the capacity and improve the performance of current 3G cellular networks. A key mechanism in the LTE traffic handling is the packet scheduler, which is in...

    Provided By University of Twente

  • White Papers // Apr 2009

    Hyperellipsoidal SVM-Based Outlier Detection Technique for GeoSensor Networks

    Recently, wireless sensor networks providing fine-grained spatio-temporal observations have become one of the major monitoring platforms for geo-applications. Along side data acquisition, outlier detection is essential in geosensor networks to ensure data quality, secure monitoring and reliable detection of interesting and critical events. A key challenge for outlier detection in...

    Provided By University of Twente

  • White Papers // Nov 2008

    An Online Outlier Detection Technique for Wireless Sensor Networks Using Unsupervised Quarter-Sphere Support Vector Machine

    The main challenge faced by outlier detection techniques designed for wireless sensor networks is achieving high detection rate and low false alarm rate while maintaining the resource consumption in the network to a minimum. In this paper, the authors propose an online outlier detection technique with low computational complexity and...

    Provided By University of Twente

  • White Papers // Sep 2008

    Multi-Channel Scheduling for Fast Convergecast in Wireless Sensor Networks

    The authors explore the following fundamental question - how fast can information be collected from a wireless sensor network? They consider a number of design parameters such as, power control, time and frequency scheduling, and routing. There are essentially two factors that hinder efficient data collection - interference and the...

    Provided By University of Twente

  • White Papers // Jun 2010

    Concern-Based Assessment of Architectural Stability: A Comparative Study

    A concern is any consideration that can impact the software architecture and other artefacts. Sustaining stability of concerns realised in architectural designs is essential to obtain long-lasting software products. It is often assumed that concern assessment mechanisms are effective to predict architecture stability. They are ought to exert a positive...

    Provided By University of Twente

  • White Papers // Jun 2010

    A Graph-Based Aspect Interference Detection Approach for UML-Based Aspect-Oriented Models

    Aspect Oriented Modeling (AOM) techniques facilitate separate modeling of concerns and allow for a more flexible composition of the resulting models than traditional techniques. While this improves the understandability of each sub-model, in order to reason about the behavior of the composed system and to detect conflicts among sub-models, automated...

    Provided By University of Twente

  • White Papers // Jun 2011

    Improving the Ultra-Low-Power Performance of IEEE 802.15.6 by Adaptive Synchronisation

    In ultra-low data rate Wireless Sensor Networks (WSNs) waking up just to listen to a beacon every superframe can be a major waste of energy. This study introduces MedMAC, a medium access protocol for ultra-low data rate WSNs that achieves significant energy efficiency through a novel synchronisation mechanism. The new...

    Provided By University of Twente

  • White Papers // Jun 2011

    Side-View Face Recognition

    As a widely used biometrics, face recognition has many advantages such as being non-intrusive, natural and passive. On the other hand, in real-life scenarios with uncontrolled environment, pose variation up to side-view positions makes face recognition a challenging work. In this paper, the authors discuss the use of side-view face...

    Provided By University of Twente

  • White Papers // Jul 2010

    Spectral Minutiae Representations for Fingerprint Recognition

    The spectral minutiae representation introduced in this paper is a novel method to represent a minutiae set as a fixed-length feature vector, which is invariant to translation, and in which rotation becomes translation that can be easily compensated for. These characteristics enable the combination of fingerprint recognition systems with a...

    Provided By University of Twente

  • White Papers // Nov 2010

    Benefits of Location-Based Access Control: A Literature Study

    Location-Based Access Control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been investigated thoroughly. To this end, the...

    Provided By University of Twente

  • White Papers // Dec 2012

    An Optimal Query Assignment for Wireless Sensor Networks

    With the increased use of large-scale real-time embedded sensor networks, new control mechanisms are needed to avoid congestion and meet required Quality of Service (QoS) levels. In this paper, the authors propose a Markov Decision Problem (MDP) to prescribe an optimal query assignment strategy that achieves a trade-off between two...

    Provided By University of Twente

  • White Papers // Jan 2009

    Implementation of an On-Demand Routing Protocol for Wireless Sensor Networks

    This paper presents their experiences in implementing and validating the on-demand EYES Source Routing protocol (ESR) in a real Wireless Sensor Network (WSN) environment. ESR has a fast recovery mechanism relying on MAC layer feedback to overcome frequent network topology changes resulting from node mobility and unreliability. A geographically restricted...

    Provided By University of Twente

  • White Papers // Jun 2009

    Security Implications of Virtualization: A Literature Study

    Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today's network connections, more and more businesses and individuals store their data remotely. Server virtualization is an important technology to facilitate this process, allowing dedicated hardware to be turned...

    Provided By University of Twente

  • White Papers // Jan 2010

    Using P3P in a Web Services-Based Context-Aware Application Platform

    This paper describes a proposal for privacy control architecture to be applied in the WASP project. The WASP project aims to develop a context-aware service platform on top of 3G networks, using web services technology. The proposed privacy control architecture is based on the P3P privacy policy description standard defined...

    Provided By University of Twente

  • White Papers // Aug 2010

    When Is It The Right Time To Change? A Case Study Of Implementing A New Activity In An Existing Business Relationship

    Scholars have argued that past experience in business relationships can impede the implementation of new activities. In this paper, the authors apply a practice-based perspective on time (Orlikowski & Yates, 2002) and examine how time and timing of change of temporal structures in business relationships are related to the implementation...

    Provided By University of Twente

  • White Papers // Aug 2010

    Consortial Benchmarking: A Method Of Academic-Practitioner Collaborative Research And Its Application In A B2B Environment

    The purpose of this paper is to develop a new method for academic-practitioner collaboration, addressing the literature on collaborative research. The research method involves model elaboration and test with an in-depth case study. In consortial benchmarking, practitioners and academic researchers form a consortium and together benchmark best-practices firms. Consortial benchmarking...

    Provided By University of Twente

  • White Papers // Dec 2009

    Distributed Branching Bisimulation Minimization by Inductive Signatures

    The idea of distributed model checking of very large systems, is to store the state space in the collective memory of a cluster of workstations, and employ parallel algorithms to analyze the graph. One approach is to generate the graph in a distributed way, and on-the-fly (i.e. during generation) run...

    Provided By University of Twente

  • White Papers // Aug 2010

    Unveiling The Importance Of Being A Preferred Customer In Order To Develop Innovations With Suppliers

    The purpose of this research is to understand why early supplier integration in new product development repeatedly fails and how to select the right suppliers to avoid supplier obstructionism. The authors review the literature on early supplier integration. They conducted a consortial benchmarking study, involving seven firms as part of...

    Provided By University of Twente

  • White Papers // Oct 2008

    Extended eTVRA Vs. Security Checklist: Experiences in a Value-Web

    Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take their products through a Common Criteria evaluation. To support security evaluation, the European Telecommunications Standards Institute (ETSI) has developed a Threat, Vulnerability, Risk...

    Provided By University of Twente

  • White Papers // May 2010

    Cloud Computing & Confidentially

    Cloud computing is an upcoming paradigm that offers tremendous advantages in economical aspects, such as reduced time to market, flexible computing capabilities, and limitless computing power. To use the full potential of cloud computing, data is transferred, processed and stored by external cloud providers. However, data owners are very skeptical...

    Provided By University of Twente

  • White Papers // Apr 2011

    D-SAR: A Distributed Scheduling Algorithm for Real-Time, Closed-Loop Control in Industrial Wireless Sensor and Actuator Networks

    Current wireless standards and protocols for industrial applications such as WirelessHART and ISA100.11a typically use centralized network management techniques for communication scheduling and route establishment. However, large-scale centralized systems can have several drawbacks. They have difficulty in coping with disturbances or changes within the network in real-time. Large-scale centralized systems...

    Provided By University of Twente

  • White Papers // Aug 2009

    Dynamic Workload Peak Detection for Slack Management

    In this paper an analytical study on dynamism and possibilities on slack exploitation by dynamic power management is presented. The authors introduce a specific workload decomposition method for work required for (streaming) application processing data tokens (e.g. video frames) with work behavior patterns as a mix of periodic and a...

    Provided By University of Twente

  • White Papers // Jan 2012

    Transaction-Based Communication-Centric Debug

    The behaviour of Systems On Chip (SOC) is complex because they contain multiple processors that interact through concurrent interconnects, such as Networks On Chip (NOC). Debugging such SOCs is hard. Based on a classification of debug scope and granularity, the authors propose that debugging should be communication-centric and based on...

    Provided By University of Twente

  • White Papers // Mar 2011

    Representing Humans in System Security Models: An Actor-Network Approach

    System models to assess the vulnerability of information systems to security threats typically represent a physical infrastructure (buildings) and a digital infrastructure (computers and networks), in combination with an attacker traversing the system while acquiring credentials. Other humans are generally not included, as their behavior is considered more difficult to...

    Provided By University of Twente

  • White Papers // Sep 2011

    Scheduler-Specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification

    Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables and the scheduling policy. Several formal definitions of observational determinism exist, but...

    Provided By University of Twente

  • White Papers // Aug 2011

    Scheduler-Related Confidentiality for Multi-Threaded Programs

    Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables. Several formal definitions of observational determinism exist, but all of them have...

    Provided By University of Twente

  • White Papers // Feb 2011

    Permission-Based Separation Logic for Multithreaded Java Programs

    This paper motivates and presents a program logic for reasoning about multithreaded Java-like programs with concurrency primitives such as dynamic thread creation, thread joining and reentrant object monitors. The logic is based on concurrent separation logic. It is the first detailed adaptation of concurrent separation logic to a multi-threaded Java-like...

    Provided By University of Twente

  • White Papers // May 2009

    A Formal Connection Between Security Automata and JML Annotations

    Security automata are a convenient way to describe security policies. Their typical use is to monitor the execution of an application, and to interrupt it as soon as the security policy is violated. However, run-time adherence checking is not always convenient. Instead, the authors aim at developing a technique to...

    Provided By University of Twente

  • White Papers // Mar 2011

    Scheduler-Dependent Inter-Cell Interference and Its Impact on LTE Uplink Performance at Flow Level

    The Long Term Evolution (LTE) cellular technology is expected to extend the capacity and improve the performance of current 3G cellular networks. Among the key mechanisms in LTE responsible for traffic management is the packet scheduler, which handles the allocation of resources to active flows in both the frequency and...

    Provided By University of Twente

  • White Papers // Aug 2009

    Performance of Relay-Enabled Uplink in Cellular Networks - A Flow Level Analysis

    Uplink users in cellular networks, such as UMTS/HSPA, located at the edge of the cell generally suffer from poor channel conditions. Deploying intermediate relay nodes is seen as a promising approach towards extending cell coverage and increasing data rates. This paper focuses on the role of packet scheduling in cellular...

    Provided By University of Twente

  • White Papers // May 2009

    Scheduler Dependent Modeling of Inter-Cell Interference in UMTS EUL

    In this paper, the authors analyze the performance of the UMTS Enhanced UpLink (EUL) in a network scenario, under various packet scheduling schemes. Besides the impact of the intrinsic differences of the scheduling schemes on EUL performance (which they studied in a previous paper for a single cell scenario), they...

    Provided By University of Twente