University of Waterloo

Displaying 121-152 of 152 results

  • White Papers // Aug 2009

    Three Improved Algorithms for Multi-Path Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission

    In this paper, the authors propose a security model to capture active attacks against Multi-Path Key Establishment (MPKE) in sensor networks. The model strengthens previous models to capture more attacks and achieve essential security goals for multipath key establishment. In this model, they can apply protocols for perfectly secure message...

    Provided By University of Waterloo

  • White Papers // Aug 2009

    Top-K Query Processing in Uncertain Databases

    Top-k processing in uncertain databases is semantically and computationally different from traditional top-k processing. The interplay between score and uncertainty information makes traditional top-k processing techniques inapplicable to uncertain databases. In this paper the authors introduce new probabilistic formulations for top-k queries. The formulations are based on marriage of traditional...

    Provided By University of Waterloo

  • White Papers // Jul 2009

    Ultra-Lightweight Cryptography for Low-Cost RFID Tags: Hummingbird Algorithm and Protocol

    Motivated by the design of the well-known Enigma machine, the authors present a novel ultra-lightweight encryption scheme, referred to as Hummingbird, and its applications to a privacy-preserving identification and mutual authentication protocol for RFID applications. Hummingbird can provide the designed security with a small block size and is therefore expected...

    Provided By University of Waterloo

  • White Papers // Jul 2009

    Corporate Financial Strategy in SMEs

    Company strategy expresses a basic idea of how to reach company objectives. A whole range of models of strategic management are used in practice. The financial strategy plays an important role in corporate strategy. The paper develops a methodology of strategic model implementing into the category of micro, Small and...

    Provided By University of Waterloo

  • White Papers // Jun 2009

    Multiplicative Characters, the Weil Bound, and Polyphase Sequence Families With Low Correlation

    Sequences with low correlation find many applications in wireless communications for acquiring the correct timing information and distinguishing multiple users or channels with low mutual interference. It is desirable that sequences have variable alphabet sizes for adaptive modulation schemes which allow variable data rates in wireless systems according to channel...

    Provided By University of Waterloo

  • White Papers // Jun 2009

    Going Mini: Extreme Lightweight Spam Filters

    In this paper, the authors set out to determine if effective mini-filters could be trained for email spam filtering, using a drastically reduced feature set. The experimental results presented suggest that several methods, including boosting with early stopping, greedy decision lists, and TWFS methods all give effective, low-cost solutions to...

    Provided By University of Waterloo

  • White Papers // Jun 2009

    Detecting Patterns in Finite Regular and Context-Free Languages

    The computational complexity of pattern matching has received much attention in the literature. Although determining whether a given word appears inside another can be done in linear time, other pattern-matching problems appear to be computationally intractable. In a classic paper, Angluin showed the problem of determining if an arbitrary pattern...

    Provided By University of Waterloo

  • White Papers // Jun 2009

    A Survey of Incentive Mechanisms in Peer-to-Peer Systems

    The fundamental assumption that Peer-To-Peer (P2P) networks can thrive on voluntary contribution of altruistic peers can no longer be supported without considering the impact of rational behavior on such decentralized systems. This paper attempts to shed light on the impact of rational free-riding behavior of participating peers on the stability...

    Provided By University of Waterloo

  • White Papers // Jun 2009

    DFMAC: DTN-Friendly Medium Access Control for Wireless Local Area Networks

    In this paper, the authors consider a wireless communication network for both low-speed mobile nodes in densely populated hotspots and high-speed mobile nodes roaming in a large area. Wireless Local Area Networks (WLANs) are deployed in the hotspots, while a delay/Disruption Tolerant Network (DTN) provides services to roaming nodes in...

    Provided By University of Waterloo

  • White Papers // Jun 2009

    SAT-Based Analysis of Feature Models Is Easy

    Feature models are a popular variability modeling notation used in product line engineering. Automated analyzes of feature models, such as consistency checking and interactive or offline product selection, often rely on translating models to propositional logic and using SATisfiability (SAT) solvers. Efficiency of individual satisfiability-based analyzes has been reported previously....

    Provided By University of Waterloo

  • White Papers // Jun 2009

    Network Virtualization: State of the Art and Research Challenges

    Recently network virtualization has been pushed forward by its proponents as a long term solution to the gradual ossification problem faced by the existing Internet and proposed to be an integral part of the next-generation networking paradigm. By allowing multiple heterogeneous network architectures to cohabit on a shared physical substrate,...

    Provided By University of Waterloo

  • White Papers // May 2009

    A Thermodynamic Turing Machine: Artificial Molecular Computing Using Classical Reversible Logic Switching Networks

    A Thermodynamic Turing Machine (TTM) concept is introduced. A TTM is a classical computing paradigm where the natural laws of thermodynamics are exploited in the form of a discrete controlled and configurable classical Boltzmann gas to efficiently implement logical mathematical operations. In its most general form the machine consists of...

    Provided By University of Waterloo

  • White Papers // May 2009

    Multilevel Coding Over Two-Hop Single-User Networks

    In this paper, a two-hop network in which information is transmitted from a source via a relay to a destination is considered. It is assumed that the channels are static fading with additive white Gaussian noise. All nodes are equipped with a single antenna and the Channel State Information (CSI)...

    Provided By University of Waterloo

  • White Papers // May 2009

    Near-Complementary Sequences With Low PMEPR for Peak Power Control in Multicarrier Communications

    A periodic autocorrelation, Boolean functions, Golay complementary sequences, Multi-Carrier Code Division Multiple Access (MC-CDMA), Multicarrier communications, Orthogonal codes, Orthogonal Frequency-Division Multiplexing (OFDM), Peak-to-Average Power Ratio (PAPR), Peak-to-Mean Envelope Power Ratio (PMEPR), Reed-Muller codes, Sequences. Multicarrier communications have recently attracted much attention in wireless applications. The Orthogonal Frequency Division Multiplexing (OFDM)...

    Provided By University of Waterloo

  • White Papers // May 2009

    Taking Advantage of the Interplay Among Software Product Lines, Service-Oriented Architectures and Multi-Agent Systems

    Multi-Agent Systems (MASs) are often being applied in a wide range of industrial applications, showing the effectiveness of the agent abstraction to develop open, highly interactive, autonomous and context-aware systems. MASs have been combined with Service-Oriented Architectures (SOAs) in order to provide customization and flexibility in these systems. This combination...

    Provided By University of Waterloo

  • White Papers // Apr 2009

    The Secrecy Capacity Region of the Degraded Vector Gaussian Broadcast Channel

    In this paper, the authors consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers via a Gaussian MIMO broadcast channel. A wire-tapper also receives the transmitted signal via another MIMO channel. It is assumed that the channels are degraded and the wire-tapper...

    Provided By University of Waterloo

  • White Papers // Apr 2009

    A Highly Scalable RFID Authentication Protocol

    In previous RFID protocols, a hash-chain is used to achieve good privacy. Each tag is associated with a chain of Q hash values. To identify one tag out of a total of N tags, a server searches a table of size NQ. A naive search takes either ?(NQ) time or...

    Provided By University of Waterloo

  • White Papers // Apr 2009

    Applications and Extensions of PTIME Description Logics With Functional Constraints

    The authors review and extend earlier work on the logic CFD, a description logic that allows terminological cycles with universal restrictions over functional roles. In particular, they consider the problem of reasoning about concept subsumption and the problem of computing certain answers for a family of attribute-connected conjunctive queries, showing...

    Provided By University of Waterloo

  • White Papers // Apr 2009

    Design of a Simulation Framework to Evaluate Trust Models for Collaborative Intrusion Detection

    Different trust models have been developed for dealing with possible dishonest behavior and attacks from malicious peer Intrusion Detection Systems (IDSs) in a collaborative Intrusion Detection Network (IDN). For evaluating and comparing these models, this paper introduces a simulation framework that incorporates different components namely expertise model, deception model, attack...

    Provided By University of Waterloo

  • White Papers // Mar 2009

    Optimizing Distributed XML Queries Through Localization and Pruning

    Distributing data collections by fragmenting them is an effective way of improving the scalability of relational database systems. The unique characteristics of XML data present challenges that require different distribution techniques to achieve scalability. In this paper, the authors propose solutions to two of the problems encountered in distributed query...

    Provided By University of Waterloo

  • White Papers // Feb 2009

    How to Improve Security and Reduce Hardware Demands of the WIPR RFID Protocol

    This paper analyzes and improves WIPR, an RFID identification scheme based on public key techniques with efficient hardware implementation. First the paper analyzes the security and privacy features of WIPR. The paper shows that a reduced version of WIPR is vulnerable to short padding attacks and WIPR needs a random...

    Provided By University of Waterloo

  • White Papers // Feb 2009

    Monitoring-Based Key Revocation Schemes for Mobile Ad Hoc Networks: Design and Security Analysis

    Due to their versatility, decentralized infrastructure and other unique properties, there has been a growing interest in Mobile Ad hoc NETworks (MANETs) for military, government and commercial applications. A primary security challenge in such networks is the likelihood of node compromises caused by weak physical protection and potentially hostile environments....

    Provided By University of Waterloo

  • White Papers // Feb 2009

    A New Achievable Rate for the Gaussian Parallel Relay Channel

    Schein and Gallager introduced the Gaussian parallel relay channel in 2000. They proposed the Amplify-and-Forward (AF) and the Decode-and-Forward (DF) strategies for this channel. For a long time, the best known achievable rate for this channel was based on the AF and DF with time sharing (AF-DF). Recently, a Rematch-and-Forward...

    Provided By University of Waterloo

  • White Papers // Feb 2009

    On the Delay-Throughput Tradeoff in Distributed Wireless Networks

    As the demand for higher data rates increases, effective resource allocation emerges as the primary issue in wireless networks in order to satisfy Quality of Service (QoS) requirements. Central to the study of resource allocation schemes, the distributed power control algorithms for maximizing the network throughput have attracted significant research...

    Provided By University of Waterloo

  • White Papers // Jan 2009

    WiFi Overcast: Enabling True Mobility for Realtime Applications in the Enterprise

    Enterprises are increasingly deploying Wireless LANs to provide mobile access to users in corporate offices. However, existing enterprise WLANs are far from being truly mobile. In particular, they do not adequately support continuous mobility, where users access the network on-the-go. Furthermore, WLANs that do provide continuous mobility support require client...

    Provided By University of Waterloo

  • White Papers // Jan 2009

    Identity Management and Resource Allocation in the Network Virtualization Environment

    Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet architecture are now limited to simple incremental updates; deployment of any new, radically different technology is next to impossible. To fend off this ossification, network virtualization has been propounded as a diversifying attribute...

    Provided By University of Waterloo

  • White Papers // Jan 2009

    Virtual Network Embedding With Coordinated Node and Link Mapping

    Recently network virtualization has been proposed as a promising way to overcome the current ossification of the Internet by allowing multiple heterogeneous Virtual Networks (VNs) to coexist on a shared infrastructure. A major challenge in this respect is the VN embedding problem that deals with efficient mapping of virtual nodes...

    Provided By University of Waterloo

  • White Papers // Jan 2009

    Financial Policy And Compensation: Payout Policy, Dividend Covenants And Pay-Performance Sensitivity

    The authors extend John and John's (1993) theoretical analysis of financial policy and managerial incentives to incorporate free cash flow, payout policy, and debt covenants, and test the theory empirically. To maintain efficient investment incentives, the manager's pay-performance sensitivity declines with the firm's dividend payout. A flexible payout policy, including...

    Provided By University of Waterloo

  • White Papers // Jan 2009

    CLIC: CLient-Informed Caching for Storage Servers

    Traditional caching policies are known to perform poorly for storage server caches. One promising approach to solving this problem is to use hints from the storage clients to manage the storage server cache. Previous hinting approaches are ad hoc, in that a predefined reaction to specific types of hints is...

    Provided By University of Waterloo

  • White Papers // Dec 2008

    Materialized View Selection in XML Databases

    Materialized views, a RDBMS silver bullet, demonstrate its efficacy in many applications, especially as a data warehousing/decision support system tool. The pivot of playing materialized views efficiently is view selection. Though studied for over thirty years in RDBMS, the selection is hard to make in the context of xml databases,...

    Provided By University of Waterloo

  • White Papers // Nov 2008

    Multimedia Messaging Service: System Description and Performance Analysis

    Following the success of Short Messaging Service (SMS), multimedia messaging service (MMS) is emerging as a natural but revolutionary successor to short messaging. MMS allows personalized multimedia messages containing content such as images, audio, text and video to be created and transferred between MMS-capable phones and other devices. By using...

    Provided By University of Waterloo

  • White Papers // Nov 2008

    On the Optimal Design of Wireless Relay Networks

    It is known that the achievable data rate per user can be increased when relays are deployed in wireless networks. However, the drawback of this solution is that some of the network resources should be allocated to the relays. In this paper, the authors consider a two-tier network where all...

    Provided By University of Waterloo

  • White Papers // Jul 2011

    From State-To Delta-Based Bidirectional Model Transformations: The Symmetric Case

    A bidirectional transformation (BX) keeps a pair of interrelated models synchronized. Symmetric BXs are those for which neither model in the pair fully determines the other. The authors build two algebraic frameworks for symmetric BXs, with one correctly implementing the other, and both being delta-based generalizations of known state-based frameworks....

    Provided By University of Waterloo

  • White Papers // Aug 2011

    Privacy: Gone With the Typing! Identifying Web Users by Their Typing Patterns

    The lack of privacy protection for Internet users has been identified as a major problem in modern web browsers. Despite potentially high risk of identification by typing patterns, this topic has received little attention in both the research and general community. In this paper, the authors present a simple but...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Automatic Tuning of the Multiprogramming Level in Sybase SQL Anywhere

    This paper looks at the problem of automatically tuning the database server multiprogramming level to improve database server performance under varying workloads. The authors describe two tuning algorithms that were considered and how they performed under different workloads. They then present the hybrid approach that they have successfully implemented in...

    Provided By University of Waterloo

  • White Papers // Mar 2010

    MAC-Layer Active Dropping for Real-Time Video Streaming in IEEE 802.16 Networks

    This paper introduces a MAC-layer Active Dropping (AD) scheme for achieving effective resource utilization and maintaining application-level quality of services in real-time video streaming over the emerging wireless broadband access networks based on Time-Division Multiple Access (TDMA). By proactively dropping the MAC-layer Protocol Data Units (MPDUs) of a video frames...

    Provided By University of Waterloo

  • White Papers // Mar 2011

    Monitoring Burst (M-Burst)- A Novel Framework of Failure Localization in All-Optical Mesh Networks

    Achieving instantaneous and precise failure localization in all-optical Wavelength Division Multiplexing (WDM) networks has been an attractive feature of network fault management systems, and is particularly important when failure-dependent protection is employed. The paper introduces a novel framework of real-time failure localization in all-optical WDM mesh networks, called monitoring-burst (m-burst),...

    Provided By University of Waterloo

  • White Papers // May 2011

    TMAC: Timestamp-Ordered MAC for CSMA/CA Wireless Mesh Networks

    The authors propose TMAC, a timestamp-ordered MAC protocol for Wireless Mesh Networks (WMNs). TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended with a timestamp to a selected list of neighbors. It can proceed...

    Provided By University of Waterloo

  • White Papers // Jul 2010

    ARBR: Adaptive Reinforcement-Based Routing for DTN

    This paper introduces a novel routing protocol in Delay Tolerant Networks (DTNs), aiming to solve the online distributed routing problem. By manipulating a collaborative reinforcement learning technique, a group of nodes can cooperate with each other and make a forwarding decision for the stored messages based on a cost function...

    Provided By University of Waterloo

  • White Papers // Sep 2009

    Optimizing Energy and Modulation Selection in Multi-Resolution Modulation for Wireless Video Broadcast/Multicast

    Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the...

    Provided By University of Waterloo

  • White Papers // Jan 2009

    Financial Policy And Compensation: Payout Policy, Dividend Covenants And Pay-Performance Sensitivity

    The authors extend John and John's (1993) theoretical analysis of financial policy and managerial incentives to incorporate free cash flow, payout policy, and debt covenants, and test the theory empirically. To maintain efficient investment incentives, the manager's pay-performance sensitivity declines with the firm's dividend payout. A flexible payout policy, including...

    Provided By University of Waterloo

  • White Papers // May 2011

    Anonymity and One-Way Authentication in Key Exchange Protocols

    Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there...

    Provided By University of Waterloo

  • White Papers // Apr 2011

    Improving The Design Of Financial Products In A Multidimensional Black-Scholes Market

    Using various techniques, authors have shown that in one-dimensional markets, complex (path-dependent) contracts are generally not optimal for rational consumers. In this paper the authors generalize these results to a multidimensional Black-Scholes market. In such a market, they discuss optimal contracts for investors who prefer more to less and have...

    Provided By University of Waterloo

  • White Papers // Apr 2010

    Design Principles for Robust Opportunistic Communication

    Several researchers have proposed the use of transient communication opportunities, that is, opportunistic communication, to reduce the cost of rural communication. The authors propose some design principles for robust opportunistic communication drawing from the experiences in developing and deploying several practical systems. They conclude with a sketch of some areas...

    Provided By University of Waterloo

  • White Papers // Apr 2010

    On the Capacity and Scheduling of a Multi-Sector Cell With Co-Channel Interference Knowledge

    The authors study the capacity of a single-hop wireless cell comprised of M fixed directional antennas concentrically arranged around a common axis and each reusing the same channel. The premise for this architecture is that co-channel interference between the fixed directional beams can be identified and reported, allowing joint conflict-free...

    Provided By University of Waterloo

  • White Papers // Feb 2011

    Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks

    Wireless ad hoc networks have great potentials in a broad range of applications. Their inherent vulnerability to various network attacks however limits their wide adaptation and deployment in practice. In this paper, the authors address one of the most dangerous attacks, packet drop attack, in wireless ad hoc networks by...

    Provided By University of Waterloo

  • White Papers // Feb 2011

    Fine-Grained Identification With Real-Time Fairness in Mobile Social Networks

    Mutual user identification is a necessary step for establishing trust among users in an unattended Mobile Social Network (MSN). Directly revealing identity information to others who are unknown to the users may result in an unfair situation regarding identity when other parties of the identification process misbehave. Using an on-line...

    Provided By University of Waterloo

  • White Papers // Feb 2009

    Monitoring-Based Key Revocation Schemes for Mobile Ad Hoc Networks: Design and Security Analysis

    Due to their versatility, decentralized infrastructure and other unique properties, there has been a growing interest in Mobile Ad hoc NETworks (MANETs) for military, government and commercial applications. A primary security challenge in such networks is the likelihood of node compromises caused by weak physical protection and potentially hostile environments....

    Provided By University of Waterloo

  • White Papers // Aug 2011

    On Verifying Dynamic Multiple Data Copies Over Cloud Servers

    Currently, many individuals and organizations outsource their data to remote Cloud Service Providers (CSPs) seeking to reduce the maintenance cost and the burden of large local data storage. The CSP offers paid storage space on its infrastructure to store customers' data. Replicating data on multiple servers across multiple data centers...

    Provided By University of Waterloo

  • White Papers // Jan 2011

    Link Scheduling in Wireless Networks With Successive Interference Cancellation

    Successive Interference Cancellation (SIC) is an effective way of Multi-Packet Reception (MPR) to combat interference at the physical layer. To understand the potential MPR advantages, the authors study link scheduling in an ad hoc network with SIC at the physical layer. The fact that the links detected sequentially by SIC...

    Provided By University of Waterloo

  • White Papers // May 2011

    Cooperative Data Dissemination Via Roadside WLANs

    Data dissemination services embrace a wide variety of telematic applications where data packets are generated at a remote server in the Internet and destined to a group of nomadic users such as vehicle passengers and pedestrians. The quality of a data dissemination service is highly dependent on the availability of...

    Provided By University of Waterloo

  • White Papers // Dec 2011

    Faster Facility Location and Hierarchical Clustering

    The authors propose several methods to speed up the facility location, and the single link and the complete link clustering algorithms. The local search algorithm for the facility location is accelerated by introducing several space partitioning methods and a parallelisation on the CPU of a standard desktop computer. The influence...

    Provided By University of Waterloo

  • White Papers // Oct 2009

    Bluetooth-Enabled In-Home Patient Monitoring System: Early Detection of Alzheimer's Disease

    As the baby boom generation is aging, more and more people are diagnosed with Alzheimer's disease, early detection of which is shown to be vital and necessary for better medical treatments and prolonging life expectancies. This paper proposes a Bluetooth-enabled in-home patient monitoring system, facilitating early detection of Alzheimer's disease....

    Provided By University of Waterloo

  • White Papers // Apr 2009

    A Highly Scalable RFID Authentication Protocol

    In previous RFID protocols, a hash-chain is used to achieve good privacy. Each tag is associated with a chain of Q hash values. To identify one tag out of a total of N tags, a server searches a table of size NQ. A naive search takes either ?(NQ) time or...

    Provided By University of Waterloo

  • White Papers // Feb 2009

    How to Improve Security and Reduce Hardware Demands of the WIPR RFID Protocol

    This paper analyzes and improves WIPR, an RFID identification scheme based on public key techniques with efficient hardware implementation. First the paper analyzes the security and privacy features of WIPR. The paper shows that a reduced version of WIPR is vulnerable to short padding attacks and WIPR needs a random...

    Provided By University of Waterloo

  • White Papers // Apr 2009

    Design of a Simulation Framework to Evaluate Trust Models for Collaborative Intrusion Detection

    Different trust models have been developed for dealing with possible dishonest behavior and attacks from malicious peer Intrusion Detection Systems (IDSs) in a collaborative Intrusion Detection Network (IDN). For evaluating and comparing these models, this paper introduces a simulation framework that incorporates different components namely expertise model, deception model, attack...

    Provided By University of Waterloo

  • White Papers // Feb 2010

    Recommendations for Optical Disc Archival Storage

    For a multitude of reasons, printing to paper is still the best option for long term preservation of archival records. However, this is not possible for all records. Audiovisual recordings obviously need to remain in a machine-readable format that can be played using current technology. Many users of digital cameras...

    Provided By University of Waterloo

  • White Papers // Mar 2010

    iMark: An Identity Management Framework for Network Virtualization Environment

    Network virtualization has gained a lot of popularity in the recent years. It has been heralded as a flexible and open ended network for the future. Network Virtualizations allow the existence of multiple Virtual Networks (VNs). These VNs in turn can assume their own individual routing, addressing, naming and transport...

    Provided By University of Waterloo

  • White Papers // Nov 2008

    Multimedia Messaging Service: System Description and Performance Analysis

    Following the success of Short Messaging Service (SMS), multimedia messaging service (MMS) is emerging as a natural but revolutionary successor to short messaging. MMS allows personalized multimedia messages containing content such as images, audio, text and video to be created and transferred between MMS-capable phones and other devices. By using...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    On Generalizations of Network Design Problems With Degree Bounds

    Iterative rounding and relaxation have arguably become the method of choice in dealing with unconstrained and constrained network design problems. This paper extends the scope of the iterative relaxation method in two directions: by handling more complex degree constraints in the minimum spanning tree problem namely laminar crossing spanning tree,...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Notio - A Java API for Developing CG Tools

    Notio is a Java API for constructing conceptual graph tools and systems. Rather than attempting to provide a comprehensive toolset, Notio attempts to address the widely varying needs of the CG community by providing a platform for the development of tools and applications. It is, first and foremost, an API...

    Provided By University of Waterloo

  • White Papers // Jun 2009

    Network Virtualization: State of the Art and Research Challenges

    Recently network virtualization has been pushed forward by its proponents as a long term solution to the gradual ossification problem faced by the existing Internet and proposed to be an integral part of the next-generation networking paradigm. By allowing multiple heterogeneous network architectures to cohabit on a shared physical substrate,...

    Provided By University of Waterloo

  • White Papers // Jan 2009

    Identity Management and Resource Allocation in the Network Virtualization Environment

    Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet architecture are now limited to simple incremental updates; deployment of any new, radically different technology is next to impossible. To fend off this ossification, network virtualization has been propounded as a diversifying attribute...

    Provided By University of Waterloo

  • White Papers // Jul 2009

    Corporate Financial Strategy in SMEs

    Company strategy expresses a basic idea of how to reach company objectives. A whole range of models of strategic management are used in practice. The financial strategy plays an important role in corporate strategy. The paper develops a methodology of strategic model implementing into the category of micro, Small and...

    Provided By University of Waterloo