University of Victoria

Displaying 1-40 of 58 results

  • White Papers // Jan 2014

    N2Sky - Neural Networks as Services in the Clouds

    The authors present the N2Sky system, which provides a framework for the exchange of neural network specific knowledge, as neural network paradigms and objects, by a virtual organization environment. It follows the sky computing paradigm delivering ample resources by the usage of federated clouds. N2Sky is a novel cloud-based neural...

    Provided By University of Victoria

  • White Papers // Aug 2013

    A Secure and Flexible Data Infrastructure for the VPH-Share Community

    The European VPH-share project develops a comprehensive service framework with the objective of sharing clinical data, information, models and workflows focusing on the analysis of the human physiopathology within the Virtual Physiological Human (VPH) community. The project envisions an extensive and dynamic data infrastructure built on top of a secure...

    Provided By University of Victoria

  • White Papers // Jul 2013

    On Enabling Compliance of Cross-organizational Business Processes

    Process compliance deals with the ability of a company to ensure that its business processes comply with domain-specific regulations and rules. So far, compliance issues have been mainly addressed for intra-organizational business processes, whereas there exists only little work dealing with compliance in the context of cross-organizational processes that involve...

    Provided By University of Victoria

  • White Papers // Jun 2013

    An Innovative Virtual Enterprise Approach to Agile Micro and SME-Based Collaboration Networks

    In this paper, the authors demonstrate a lightweight and highly decentralized collaboration infrastructure approach for virtual enterprises and describe its added-value in the customer-oriented production domain. First, they will describe challenges and key requirements of an exemplary application scenario. Second, they are going to present the reference architecture and will...

    Provided By University of Victoria

  • White Papers // Apr 2013

    SPRINT- Responsibilities: Design and Development of Security Policies in Process-Aware Information Systems

    Process-Aware Information Systems (PAIS) enable the definition, execution, and management of business processes. Typically, processes are specified by control flow, data flow, and users or services, authorized to execute process tasks. During process execution, it is often necessary to access sensitive data such as patient or customer information. To secure...

    Provided By University of Victoria

  • White Papers // Jul 2012

    Cooperative Positioning When Using Local Position Information: Theoretical Framework and Error Analysis

    Global positioning technologies such as GPS are ubiquitously available for modern smartphones, on-board navigation computers of vehicles, sports appliances, etc. Positioning enables new networking and application solutions, but suffers from insufficient positioning accuracy. The authors present a way for improving the accuracy of a global positioning system by adding a...

    Provided By University of Victoria

  • White Papers // May 2012

    SPRINT - Responsibilities: Design and Development of Security Policies in Process-Aware Information Systems

    Process-Aware Information Systems (PAIS) enable the definition, execution, and management of business processes. Typically, processes are specified by control flow, data flow, and users or services, authorized to execute process tasks. During process execution, it is often necessary to access sensitive data such as patient or customer information. To secure...

    Provided By University of Victoria

  • White Papers // May 2012

    Low Complexity Distortionless Techniques for Peak Power Reduction in OFDM Communication Systems

    A high Peak-to-Average Power Ratio (PAPR) is one of the major drawbacks to using Orthogonal Frequency Division Multiplexing (OFDM) modulation. The three most effective distortionless techniques for PAPR reduction are Partial Transmit Sequence (PTS), SeLective Mapping (SLM), and Tone Reservation (TR). However, the high computational complexity due to the Inverse...

    Provided By University of Victoria

  • White Papers // May 2012

    On Applying Sonification Methods to Convey Business Process Data

    Visualization of business process models with large numbers of process activities and running instances in different execution states shows various limitations. Hence, using sonification methods becomes a promising idea to enable users to gain insight into process information that cannot be conveyed by using purely visual means. This visionary short...

    Provided By University of Victoria

  • White Papers // May 2012

    Discovering Algorithms With Matrix Code

    In first-year programming courses it is often difficult to show students how an algorithm can be discovered. In this paper, the authors present a program format that supports the development from specification to code in small and obvious steps; that is, a discovery process. The format, called Matrix Code, can...

    Provided By University of Victoria

  • White Papers // Jan 2012

    Towards Secure and Scalable Computation in Peer-to-Peer Networks

    The potential of peer-to-peer(p2p) networks has been hobbled by the authors' lack of understanding of how to design robust algorithms for large-scale networks. Networks that are truly p2p are currently very unsophisticated computationally: they are only able to provide the functionality of very basic data structures such as hash tables...

    Provided By University of Victoria

  • White Papers // Nov 2011

    Matrix Code: A Language for Parallel Development of Code and Proof

    A program in matrix code is a matrix that can be interpreted in three ways. First, it is an executable program. Second, the matrix can be interpreted as a set of Floyd verification conditions that prove the program partially correct. Third, the matrix can be interpreted as a transformation in...

    Provided By University of Victoria

  • White Papers // Oct 2011

    ET (Smart) Phone Home!

    Most home users are not able to troubleshoot advanced network issues themselves. Hours on the phone with an ISP's customer representative is a common way to solve this problem. With the advent of mobile devices with both Wi-Fi and cellular radios, troubleshooters at the ISP have a new back-door into...

    Provided By University of Victoria

  • White Papers // Oct 2011

    The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review

    Recent papers have urged the need for new forensic techniques and tools able to investigate anti-forensics methods, and have promoted automation of live investigation. Such techniques and tools are called proactive forensic approaches, i.e., approaches that can deal with digitally investigating an incident while it occurs. To come up with...

    Provided By University of Victoria

  • White Papers // Sep 2011

    Monitoring Business Process Compliance Using Compliance Rule Graphs

    Driven by recent trends, effective compliance control has become a crucial success factor for companies now-a-days. In this paper, compliance monitoring is considered an important building block to support business process compliance. Key to the practical application of a monitoring framework will be its ability to reveal and pinpoint violations...

    Provided By University of Victoria

  • White Papers // May 2011

    Converged Services Orchestration vs. Choreography Revised

    Converged services alignment (i.e., orchestration and choreography) has been a dominant topic of several regulatory initiatives. These initiatives were successful to some extent, but had faced also various difficulties, that prevented any final specification grade. Thus, this paper revises the converged services orchestration and choreography concerns that apply for an...

    Provided By University of Victoria

  • White Papers // Feb 2011

    Conflict on a Communication Channel

    Imagine that Alice wants to send a message to Bob, and that Carol wants to prevent this. Assume there is a communication channel between Alice and Bob, but that Carol is capable of blocking this channel. Furthermore, there is a cost of S dollars to send on the channel, L...

    Provided By University of Victoria

  • White Papers // Feb 2011

    Co-Induction and Computational Semantics for Public-Key Encryption With Key Cycles

    The authors consider the computational soundness and completeness of formal indistinguishability in public-key cryptography, in the presence of key-cycles. This problem in the absence of key-cycles is addressed in by Herzog. It is known from that the standard notions of computational security cannot give a computationally-sound interpretation to key-cyclic expressions....

    Provided By University of Victoria

  • White Papers // Jan 2011

    Network Modulation: A New Dimension to Enhance Wireless Network Performance

    The authors introduce an approach called network modulation which gives a new dimension to improve wireless network throughput and save energy. In current wireless systems, when a source transmits data to the receiver through a single-hop or multi-hop wireless path, the physical layer modulates and demodulates the information bits hop-by-hop,...

    Provided By University of Victoria

  • White Papers // Jan 2011

    Data Intensive High Energy Physics Analysis in a Distributed Cloud

    The authors show that distributed Infrastructure-as-a-Service (IaaS) compute clouds can be effectively used for the analysis of high energy physics data. They have designed a distributed cloud system that works with any application using large input data sets requiring a high throughput computing environment. The system uses IaaS-enabled science and...

    Provided By University of Victoria

  • White Papers // Jan 2011

    Range-Free Sensor Localization With Ring Overlapping Based on Comparison of Received Signal Strength Indicator

    Sensor localization has become an essential requirement for many applications over wireless sensor networks. Radio irregularity and stringent constraints on hardware cost and battery power, however, make localization very challenging. Range-based localization depends on special-purpose hardware for direct measurement of the distance to reference points. Range-free localization, in contrast, does...

    Provided By University of Victoria

  • White Papers // Nov 2010

    Denoising by Spatial Domain Averaging for Wireless Local Area Network Terminal Localization

    Terminal localization for indoor Wireless Local Area Networks (WLANs) is critical for the deployment of location-aware computing inside of buildings. A major challenge is obtaining high localization accuracy in presence of fluctuations of the Received Signal Strength (RSS) measurements caused by multipath fading. This paper focuses on reducing the effect...

    Provided By University of Victoria

  • White Papers // Aug 2010

    On Enabling Data-Aware Compliance Checking of Business Process Models

    In the light of an increasing demand on business process compliance, the verification of process models against compliance rules has become essential in enterprise computing. To be broadly applicable compliance checking has to support data-aware compliance rules as well as to consider data conditions within a process model. Independently of...

    Provided By University of Victoria

  • White Papers // Aug 2010

    Advanced Migration Strategies for Adaptive Process Management Systems

    Enabling dynamic process changes is an essential requirement for any adaptive process management technology. Particularly, it should be possible to migrate (long-) running process instances to a new process schema version. Further, instance migration must not violate soundness; i.e., structural and behavioral consistency of executed process schemas need to be...

    Provided By University of Victoria

  • White Papers // Jun 2010

    Cloud Scheduler: A Resource Manager for Distributed Compute Clouds

    The availability of Infrastructure-as-a-Service (IaaS) computing clouds gives researchers access to a large set of new resources for running complex scientific applications. However, exploiting cloud resources for large numbers of jobs requires significant effort and expertise. In order to make it simple and transparent for researchers to deploy their applications,...

    Provided By University of Victoria

  • White Papers // Jun 2010

    Tag Clouds and Old Maps: Annotations as Linked Spatiotemporal Data in the Cultural Heritage Domain

    In this paper, the authors present a web-based system for annotating digitised old maps. Using bibliographic metadata and geographical reference information associated with the map, annotations are represented as spatially and temporally defined RDF resources. At the same time, named entity recognition and semantic link discovery are applied to each...

    Provided By University of Victoria

  • White Papers // Mar 2010

    Lifting File Systems into the Linked Data Cloud with TripFS

    A major fraction of digital information is stored in file systems. File systems organize files usually in labelled directory trees and provide a minimum support for user-driven file annotation, linkage and categorization. Although file systems play a major role in knowledge organization, both in enterprise contexts as well as in...

    Provided By University of Victoria

  • White Papers // Jan 2010

    Mining Frequent Highly-Correlated Item-Pairs at Very Low Support Levels

    The ability to extract frequent pairs from a set of transactions is one of the fundamental building blocks of data mining. When the number of items in a given transaction is relatively small the problem is trivial. Even when dealing with millions of transactions it is still trivial if the...

    Provided By University of Victoria

  • White Papers // Jan 2010

    Detecting Connection-Chains: A Data Mining Approach

    A connection-chain refers to a mechanism in which some-one recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important vector in many security attacks, so it is essential to be able to detect them. In this paper, the authors propose a...

    Provided By University of Victoria

  • White Papers // Dec 2009

    Practical Scheduling Algorithms for Concurrent Transmissions in Rate-Adaptive Wireless Networks

    Optimal scheduling for concurrent transmissions in rate-non-adaptive wireless networks is NP-hard. Optimal scheduling in rate-adaptive wireless networks is even more difficult, because, due to mutual interference, each flow's throughput in a time slot is unknown before the scheduling decision of that slot is finalized. The capacity bound derived for rate-non-adaptive...

    Provided By University of Victoria

  • White Papers // Nov 2009

    General Model for Single and Multiple Channels WLANs With Quality of Service Support

    In this paper the authors develop an intergraded model for request mechanism and data transmission in the uplink phase in the presence of channel noise. This model supports quality of service. The wireless channel is prone to many impairments. Thus, certain techniques have to be developed to deliver data to...

    Provided By University of Victoria

  • White Papers // Aug 2009

    Achieving Business Process Model Interoperability Using Metamodels and Ontologies

    Common user- and business-requirements demand an integrated view on the multitude of available information resources that are processed in a variety of heterogeneous information systems. Therefore, the research field of semantic integration which is a prerequisite for the interoperability of systems is of high importance. In this paper, the authors...

    Provided By University of Victoria

  • White Papers // Aug 2009

    Evolving Schemes for Streaming XML

    In this paper, the authors model schema evolution for XML by defining formal language operators on Visibly Pushdown Languages (VPLs). Their goal is to provide a framework for efficient validation of streaming XML in the realistic setting where the schemas of the exchanging parties evolve and thus diverge from one...

    Provided By University of Victoria

  • White Papers // Jul 2009

    Run to Potential: Sweep Coverage in Wireless Sensor Networks

    Wireless sensor networks have become a promising technology in monitoring physical world. In many applications with wireless sensor networks, it is essential to understand how well an interested area is monitored (covered) by sensors. The traditional way of evaluating sensor coverage requires that every point in the field should be...

    Provided By University of Victoria

  • White Papers // Jun 2009

    Scalable APRIORI-Based Frequent Pattern Discovery

    Frequent pattern discovery, the task of finding sets of items that frequently occur together in a dataset, has been at the core of the field of data mining for the past sixteen years. In that time, the size of datasets has grown much faster than has the ability of existing...

    Provided By University of Victoria

  • White Papers // May 2009

    HEP Specific Benchmarks of Virtual Machines on Multi-Core CPU Architectures

    Virtualization technologies such as Xen can be used in order to satisfy the disparate and often incompatible system requirements of different user groups in shared-use computing facilities. This capability is particularly important for HEP applications, which often have restrictive requirements. The use of virtualization adds flexibility, however, it is essential...

    Provided By University of Victoria

  • White Papers // Apr 2009

    The Promises and Perils of Mining Git

    The authors are now witnessing the rapid growth of Decentralized Source Code Management (DSCM) systems, in which every developer has her own repository. DSCMs facilitate a style of collaboration in which work output can flow sideways (and privately) between collaborators, rather than always up and down (and publicly) via a...

    Provided By University of Victoria

  • White Papers // Apr 2009

    Bridges Over Convulsing Waters: The EU Aspiring Eastern Partners' Role In The Regional Governance

    The enlargement of the European Union (EU) to the East in 2004 and 2007 so as to include ten former communist countries and two small Mediterranean islands has triggered new questions on the nature of EU governance. The authors argue that the accession of Central and Eastern European countries (CEECs)...

    Provided By University of Victoria

  • White Papers // Apr 2009

    Performance Modeling of Stochastic Networks With Network Coding

    With network coding, a network node can code information flows before forwarding them. While it has been theoretically proved that network coding can achieve maximum network throughput, the theoretical results usually do not consider the burstiness of data traffic, delays, and the stochastic nature in information processing and transmission. There...

    Provided By University of Victoria

  • White Papers // Feb 2009

    License Integration Patterns: Addressing License Mismatches in Component-Based Development

    In this paper the authors address the problem of combining software components with different and possibly incompatible legal licenses to create a software application that does not violate any of these licenses while potentially having its own. The authors call this problem the license mismatch problem. The rapid growth and...

    Provided By University of Victoria

  • White Papers // Jan 2009

    Hand Held Analog Television Over WiMAX Executed in SW

    This paper describes a device capable of performing the following tasks: it samples and decodes the composite video analog TV signal, it encodes the resulting RGB data into a MPEG-4 stream and sends it over a WiMAX link. On the other end of the link a similar device receives the...

    Provided By University of Victoria

  • White Papers // May 2009

    HEP Specific Benchmarks of Virtual Machines on Multi-Core CPU Architectures

    Virtualization technologies such as Xen can be used in order to satisfy the disparate and often incompatible system requirements of different user groups in shared-use computing facilities. This capability is particularly important for HEP applications, which often have restrictive requirements. The use of virtualization adds flexibility, however, it is essential...

    Provided By University of Victoria

  • White Papers // Apr 2009

    Bridges Over Convulsing Waters: The EU Aspiring Eastern Partners' Role In The Regional Governance

    The enlargement of the European Union (EU) to the East in 2004 and 2007 so as to include ten former communist countries and two small Mediterranean islands has triggered new questions on the nature of EU governance. The authors argue that the accession of Central and Eastern European countries (CEECs)...

    Provided By University of Victoria

  • White Papers // Nov 2010

    Denoising by Spatial Domain Averaging for Wireless Local Area Network Terminal Localization

    Terminal localization for indoor Wireless Local Area Networks (WLANs) is critical for the deployment of location-aware computing inside of buildings. A major challenge is obtaining high localization accuracy in presence of fluctuations of the Received Signal Strength (RSS) measurements caused by multipath fading. This paper focuses on reducing the effect...

    Provided By University of Victoria

  • White Papers // Feb 2011

    Co-Induction and Computational Semantics for Public-Key Encryption With Key Cycles

    The authors consider the computational soundness and completeness of formal indistinguishability in public-key cryptography, in the presence of key-cycles. This problem in the absence of key-cycles is addressed in by Herzog. It is known from that the standard notions of computational security cannot give a computationally-sound interpretation to key-cyclic expressions....

    Provided By University of Victoria

  • White Papers // Apr 2009

    The Promises and Perils of Mining Git

    The authors are now witnessing the rapid growth of Decentralized Source Code Management (DSCM) systems, in which every developer has her own repository. DSCMs facilitate a style of collaboration in which work output can flow sideways (and privately) between collaborators, rather than always up and down (and publicly) via a...

    Provided By University of Victoria

  • White Papers // Nov 2009

    General Model for Single and Multiple Channels WLANs With Quality of Service Support

    In this paper the authors develop an intergraded model for request mechanism and data transmission in the uplink phase in the presence of channel noise. This model supports quality of service. The wireless channel is prone to many impairments. Thus, certain techniques have to be developed to deliver data to...

    Provided By University of Victoria

  • White Papers // Feb 2009

    License Integration Patterns: Addressing License Mismatches in Component-Based Development

    In this paper the authors address the problem of combining software components with different and possibly incompatible legal licenses to create a software application that does not violate any of these licenses while potentially having its own. The authors call this problem the license mismatch problem. The rapid growth and...

    Provided By University of Victoria

  • White Papers // Jan 2011

    Data Intensive High Energy Physics Analysis in a Distributed Cloud

    The authors show that distributed Infrastructure-as-a-Service (IaaS) compute clouds can be effectively used for the analysis of high energy physics data. They have designed a distributed cloud system that works with any application using large input data sets requiring a high throughput computing environment. The system uses IaaS-enabled science and...

    Provided By University of Victoria

  • White Papers // Jun 2010

    Cloud Scheduler: A Resource Manager for Distributed Compute Clouds

    The availability of Infrastructure-as-a-Service (IaaS) computing clouds gives researchers access to a large set of new resources for running complex scientific applications. However, exploiting cloud resources for large numbers of jobs requires significant effort and expertise. In order to make it simple and transparent for researchers to deploy their applications,...

    Provided By University of Victoria

  • White Papers // Dec 2009

    Practical Scheduling Algorithms for Concurrent Transmissions in Rate-Adaptive Wireless Networks

    Optimal scheduling for concurrent transmissions in rate-non-adaptive wireless networks is NP-hard. Optimal scheduling in rate-adaptive wireless networks is even more difficult, because, due to mutual interference, each flow's throughput in a time slot is unknown before the scheduling decision of that slot is finalized. The capacity bound derived for rate-non-adaptive...

    Provided By University of Victoria

  • White Papers // Jan 2011

    Network Modulation: A New Dimension to Enhance Wireless Network Performance

    The authors introduce an approach called network modulation which gives a new dimension to improve wireless network throughput and save energy. In current wireless systems, when a source transmits data to the receiver through a single-hop or multi-hop wireless path, the physical layer modulates and demodulates the information bits hop-by-hop,...

    Provided By University of Victoria

  • White Papers // Jul 2009

    Run to Potential: Sweep Coverage in Wireless Sensor Networks

    Wireless sensor networks have become a promising technology in monitoring physical world. In many applications with wireless sensor networks, it is essential to understand how well an interested area is monitored (covered) by sensors. The traditional way of evaluating sensor coverage requires that every point in the field should be...

    Provided By University of Victoria

  • White Papers // Jan 2011

    Range-Free Sensor Localization With Ring Overlapping Based on Comparison of Received Signal Strength Indicator

    Sensor localization has become an essential requirement for many applications over wireless sensor networks. Radio irregularity and stringent constraints on hardware cost and battery power, however, make localization very challenging. Range-based localization depends on special-purpose hardware for direct measurement of the distance to reference points. Range-free localization, in contrast, does...

    Provided By University of Victoria

  • White Papers // Aug 2009

    Evolving Schemes for Streaming XML

    In this paper, the authors model schema evolution for XML by defining formal language operators on Visibly Pushdown Languages (VPLs). Their goal is to provide a framework for efficient validation of streaming XML in the realistic setting where the schemas of the exchanging parties evolve and thus diverge from one...

    Provided By University of Victoria

  • White Papers // Jan 2010

    Mining Frequent Highly-Correlated Item-Pairs at Very Low Support Levels

    The ability to extract frequent pairs from a set of transactions is one of the fundamental building blocks of data mining. When the number of items in a given transaction is relatively small the problem is trivial. Even when dealing with millions of transactions it is still trivial if the...

    Provided By University of Victoria

  • White Papers // Jun 2009

    Scalable APRIORI-Based Frequent Pattern Discovery

    Frequent pattern discovery, the task of finding sets of items that frequently occur together in a dataset, has been at the core of the field of data mining for the past sixteen years. In that time, the size of datasets has grown much faster than has the ability of existing...

    Provided By University of Victoria

  • White Papers // Dec 2008

    Preferential Regular Path Queries

    In this paper, the authors introduce preferential regular path queries. These are regular path queries whose symbols are annotated with preference weights for "Scaling" up or down the intrinsic importance of matching a symbol against a (semi-structured) database edge label. Annotated regular path queries are expressed syntactically as annotated regular...

    Provided By University of Victoria

  • White Papers // Dec 2008

    A New Method for Indexing Genomes Using On-Disk Suffix Trees

    The authors propose a new method to build persistent suffix trees for indexing the genomic data. Their algorithm DiGeST (Disk-Based Genomic Suffix Tree) improves significantly over previous work in reducing the random access to the input string and performing only two passes over disk data. DiGeST is based on the...

    Provided By University of Victoria

  • White Papers // Dec 2008

    Rewriting of Visibly Pushdown Languages for XML Data Integration

    In this paper, the authors focus on XML data integration by studying rewritings of XML target schemas in terms of source schemas. Rewriting is very important in data integration systems where the system is asked to find and assemble XML documents from the data sources and produce documents which satisfy...

    Provided By University of Victoria

  • White Papers // Jan 2010

    Detecting Connection-Chains: A Data Mining Approach

    A connection-chain refers to a mechanism in which some-one recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important vector in many security attacks, so it is essential to be able to detect them. In this paper, the authors propose a...

    Provided By University of Victoria

  • White Papers // Jul 2012

    Cooperative Positioning When Using Local Position Information: Theoretical Framework and Error Analysis

    Global positioning technologies such as GPS are ubiquitously available for modern smartphones, on-board navigation computers of vehicles, sports appliances, etc. Positioning enables new networking and application solutions, but suffers from insufficient positioning accuracy. The authors present a way for improving the accuracy of a global positioning system by adding a...

    Provided By University of Victoria

  • White Papers // May 2011

    Converged Services Orchestration vs. Choreography Revised

    Converged services alignment (i.e., orchestration and choreography) has been a dominant topic of several regulatory initiatives. These initiatives were successful to some extent, but had faced also various difficulties, that prevented any final specification grade. Thus, this paper revises the converged services orchestration and choreography concerns that apply for an...

    Provided By University of Victoria

  • White Papers // Jan 2012

    Towards Secure and Scalable Computation in Peer-to-Peer Networks

    The potential of peer-to-peer(p2p) networks has been hobbled by the authors' lack of understanding of how to design robust algorithms for large-scale networks. Networks that are truly p2p are currently very unsophisticated computationally: they are only able to provide the functionality of very basic data structures such as hash tables...

    Provided By University of Victoria

  • White Papers // Feb 2011

    Conflict on a Communication Channel

    Imagine that Alice wants to send a message to Bob, and that Carol wants to prevent this. Assume there is a communication channel between Alice and Bob, but that Carol is capable of blocking this channel. Furthermore, there is a cost of S dollars to send on the channel, L...

    Provided By University of Victoria

  • White Papers // Oct 2011

    ET (Smart) Phone Home!

    Most home users are not able to troubleshoot advanced network issues themselves. Hours on the phone with an ISP's customer representative is a common way to solve this problem. With the advent of mobile devices with both Wi-Fi and cellular radios, troubleshooters at the ISP have a new back-door into...

    Provided By University of Victoria

  • White Papers // Apr 2009

    Performance Modeling of Stochastic Networks With Network Coding

    With network coding, a network node can code information flows before forwarding them. While it has been theoretically proved that network coding can achieve maximum network throughput, the theoretical results usually do not consider the burstiness of data traffic, delays, and the stochastic nature in information processing and transmission. There...

    Provided By University of Victoria

  • White Papers // Nov 2011

    Matrix Code: A Language for Parallel Development of Code and Proof

    A program in matrix code is a matrix that can be interpreted in three ways. First, it is an executable program. Second, the matrix can be interpreted as a set of Floyd verification conditions that prove the program partially correct. Third, the matrix can be interpreted as a transformation in...

    Provided By University of Victoria

  • White Papers // Oct 2011

    The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review

    Recent papers have urged the need for new forensic techniques and tools able to investigate anti-forensics methods, and have promoted automation of live investigation. Such techniques and tools are called proactive forensic approaches, i.e., approaches that can deal with digitally investigating an incident while it occurs. To come up with...

    Provided By University of Victoria

  • White Papers // May 2012

    Discovering Algorithms With Matrix Code

    In first-year programming courses it is often difficult to show students how an algorithm can be discovered. In this paper, the authors present a program format that supports the development from specification to code in small and obvious steps; that is, a discovery process. The format, called Matrix Code, can...

    Provided By University of Victoria

  • White Papers // May 2012

    Low Complexity Distortionless Techniques for Peak Power Reduction in OFDM Communication Systems

    A high Peak-to-Average Power Ratio (PAPR) is one of the major drawbacks to using Orthogonal Frequency Division Multiplexing (OFDM) modulation. The three most effective distortionless techniques for PAPR reduction are Partial Transmit Sequence (PTS), SeLective Mapping (SLM), and Tone Reservation (TR). However, the high computational complexity due to the Inverse...

    Provided By University of Victoria

  • White Papers // May 2012

    SPRINT - Responsibilities: Design and Development of Security Policies in Process-Aware Information Systems

    Process-Aware Information Systems (PAIS) enable the definition, execution, and management of business processes. Typically, processes are specified by control flow, data flow, and users or services, authorized to execute process tasks. During process execution, it is often necessary to access sensitive data such as patient or customer information. To secure...

    Provided By University of Victoria

  • White Papers // Jun 2013

    An Innovative Virtual Enterprise Approach to Agile Micro and SME-Based Collaboration Networks

    In this paper, the authors demonstrate a lightweight and highly decentralized collaboration infrastructure approach for virtual enterprises and describe its added-value in the customer-oriented production domain. First, they will describe challenges and key requirements of an exemplary application scenario. Second, they are going to present the reference architecture and will...

    Provided By University of Victoria

  • White Papers // Aug 2006

    A B2B Benchmark on Top of UMM and TPC-App

    The TPC-App is a B2B benchmark implementing a retail scenario. This benchmark specifies a set of web services interactions to test the performance of an application server. Today B2B systems undergo a permanent technological change. There even exist competitive technologies at the same time. From a business perspective it is...

    Provided By University of Victoria

  • White Papers // Sep 2011

    Monitoring Business Process Compliance Using Compliance Rule Graphs

    Driven by recent trends, effective compliance control has become a crucial success factor for companies now-a-days. In this paper, compliance monitoring is considered an important building block to support business process compliance. Key to the practical application of a monitoring framework will be its ability to reveal and pinpoint violations...

    Provided By University of Victoria

  • White Papers // Mar 2006

    Business in the Grid: Project Results

    Grid computing has gained lots of popularity in the last decade in particular in the academic environment. Several technically sound prototypes of Grid middleware systems have been created and are in use in data and/or computing intensive scientific domains. Although several multi-national Grid projects have industry partners, Grid technology is...

    Provided By University of Victoria

  • White Papers // Apr 2013

    SPRINT- Responsibilities: Design and Development of Security Policies in Process-Aware Information Systems

    Process-Aware Information Systems (PAIS) enable the definition, execution, and management of business processes. Typically, processes are specified by control flow, data flow, and users or services, authorized to execute process tasks. During process execution, it is often necessary to access sensitive data such as patient or customer information. To secure...

    Provided By University of Victoria

  • White Papers // Mar 2010

    Lifting File Systems into the Linked Data Cloud with TripFS

    A major fraction of digital information is stored in file systems. File systems organize files usually in labelled directory trees and provide a minimum support for user-driven file annotation, linkage and categorization. Although file systems play a major role in knowledge organization, both in enterprise contexts as well as in...

    Provided By University of Victoria

  • White Papers // Jun 2010

    Tag Clouds and Old Maps: Annotations as Linked Spatiotemporal Data in the Cultural Heritage Domain

    In this paper, the authors present a web-based system for annotating digitised old maps. Using bibliographic metadata and geographical reference information associated with the map, annotations are represented as spatially and temporally defined RDF resources. At the same time, named entity recognition and semantic link discovery are applied to each...

    Provided By University of Victoria

  • White Papers // Apr 2006

    Design and Implementation Choices for Implementing Distributed CCA Frameworks

    The Common Component Architecture (CCA) specification is designed to provide a plug-and-play environment for scientists to manage the complexity of large-scale scientific simulations. The same specification is used for the implementation of sequential, parallel and distributed frameworks. The CCA specification places minimal requirements on the framework design, thus allowing various...

    Provided By University of Victoria