University Of Zululand

Displaying 1-24 of 24 results

  • White Papers // Sep 2014

    The Making of Cloud Applications - An Empirical Study on Software Development for the Cloud

    Cloud computing is gaining more and more traction as a deployment and provisioning model for software. While a large body of research already covers how to optimally operate a cloud system, the authors are still lacking insights into how professional software engineers actually use clouds, and how the cloud impacts...

    Provided By University Of Zululand

  • White Papers // Aug 2014

    Cloud WorkBench - Infrastructure-as-Code Based Cloud Benchmarking

    To optimally deploy their applications, users of Infrastructure-as-a-Service clouds are required to evaluate the costs and performance of different combinations of cloud configurations to find out which combination provides the best service level for their specific application. Unfortunately, benchmarking cloud services is cumbersome and error-prone. In this paper, the authors...

    Provided By University Of Zululand

  • White Papers // Sep 2013

    Scalable Linked Data Stream Processing via Network-Aware Workload Scheduling

    In order to cope with the ever-increasing data volume, distributed stream processing systems have been proposed. To ensure scalability most distributed systems partition the data and distribute the workload among multiple machines. This approach does, however, raise the question how the data and the workload should be partitioned and distributed....

    Provided By University Of Zululand

  • White Papers // May 2013

    Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures

    The problem of replacing current cryptographic primitives which will be subject to quantum computer attacks with alternative post-quantum solutions is fostering research on code-based systems, which are among the most promising options for this replacement. In this paper, the authors address the problem of achieving efficient code-based digital signatures with...

    Provided By University Of Zululand

  • White Papers // Jan 2013

    Bypassing Cloud Providers' Data Validation to Store Arbitrary Data

    A fundamental Software-as-a-Service (SaaS) characteristic in Cloud Computing is to be application-specific; depending on the application, Cloud Providers (CPs) restrict data formats and attributes allowed into their servers via a data validation process. An ill-defined data validation process may directly impact both security (e.g. application failure, legal issues) and accounting...

    Provided By University Of Zululand

  • White Papers // Nov 2012

    S/T/A: Meta-Modeling Run-Time Adaptation in Component-Based System Architectures

    Modern virtualized system environments usually host diverse applications of different parties and aim at utilizing resources efficiently while ensuring that quality-of-service requirements are continuously satisfied. In such scenarios, complex adaptations to changes in the system environment are still largely performed manually by humans. Over the past decade, autonomic self-adaptation techniques...

    Provided By University Of Zululand

  • White Papers // Jul 2012

    Analysis of a Key Distribution Scheme in Secure Multicasting

    This paper presents an analysis of the secure key broadcasting scheme proposed by Wu, Ruan, Lai and Tseng. The study of the parameters of the system is based on a connection with a special type of symmetric equations over finite fields. The authors present two different attacks against the system,...

    Provided By University Of Zululand

  • White Papers // May 2012

    On Burst Error Correction and Storage Security of Noisy Data

    Secure storage of noisy data for authentication purposes usually involves the use of error correcting codes. The authors propose a new model scenario involving burst errors and present for that several constructions. Sensible data, as e.g. passwords, are usually stored via the use of a one-way hash function, so that...

    Provided By University Of Zululand

  • White Papers // Oct 2011

    On Fuzzy Syndrome Hashing with LDPC Coding

    The last decades have seen a growing interest in hash functions that allow some sort of tolerance, e.g. for the purpose of biometric authentication. Among these, the syndrome fuzzy hashing construction allows to securely store biometric data and to perform user authentication without the need of sharing any secret key....

    Provided By University Of Zululand

  • White Papers // Aug 2011

    The Effect of DAD Timeout Period on Address Autoconfiguration in Wireless Ad-Hoc Networks

    Lack of manual management mechanisms in wireless ad-hoc networks means that automatic configuration of IP addresses and other related network parameters are very crucial. Many IP address auto-configuration mechanisms have been proposed in literature. These approaches can be categorized as either being stateful or stateless. Stateless protocols employ a Duplicate...

    Provided By University Of Zululand

  • White Papers // Aug 2011

    A Grid Infrastructure for Knowledge-Based Applications in Open and Dynamic Computing Environments

    The drive towards net-centric applications that enable ubiquitous computing has led to the need for computing systems that operate and interact at knowledge level. In order for this vision to be realised, knowledge need to be modelled as a resource that is made available to computing systems on a global...

    Provided By University Of Zululand

  • White Papers // Aug 2011

    Evaluation of Transport Layer Protocols Over Wireless Multihop Networks

    In a Wireless Multi-hop Network (WMN), numerous QoS mechanisms such as routing, topology control protocol and Transport Layer Protocols (TLPs) have been proposed. The focus of this paper is on the TLPs. TLPs are responsible for connection establishment and attempt to ensure that all data are transmitted from source to...

    Provided By University Of Zululand

  • White Papers // Aug 2011

    Comparative Study of Web Services Platforms in a GUISET Environment

    GUISET (Grid-based Utility Infrastructure for SMME Enabling Technology) architecture aims at delivering e-services to resource-constrained Small Medium and Micro Enterprises (SMMEs) by taking advantage of advances and trends toward Service Oriented Architecture (SOA) within the software industry. A technology that has received widespread adoption within SOA for implementing services is...

    Provided By University Of Zululand

  • White Papers // May 2011

    Comparison of Routing Metrics forWireless Mesh Networks

    A number of routing metrics exist in wireless networks. These routing metrics were originally designed for Mobile Ad hoc NETworks (MANETs). When Wireless Mesh Networks (WMNs) came into being, an idea of introducing and using these routing metrics for WMNs was considered. The problem that arises is that these routing...

    Provided By University Of Zululand

  • White Papers // Aug 2010

    Effect of Network Traffic on Duplicate Address Detection in Wireless Ad Hoc Networks

    While much effort has been put in the creation of IP address auto-configuration protocols, very little has been done in testing the different protocols in different network conditions like different network topologies and different types of traffic. IP auto-configuration in mobile ad hoc networks has attracted much attention. Efficient Duplicate...

    Provided By University Of Zululand

  • White Papers // Jul 2010

    A Test-Bed Evaluation of Connectivity Strategies for Infrastructure Wireless Mesh Networks

    The wireless mesh network backbone is usually comprised of stationary nodes that are not uniformly distributed and connectivity is traditionally assured by requiring that all nodes use their maximum transceiver powers. The use of maximum transceiver powers may actually not be necessary to ensure network connectivity and this realization has...

    Provided By University Of Zululand

  • White Papers // Apr 2010

    Challenges of Evidence Acquisition in Wireless Ad-Hoc Networks

    Network forensics plays a major role in the investigation of criminal activities involving computer networks. Investigating such crimes is still an open research area due to the fact that technology is always advancing hence investigators must always be up-to-date with technological advancements. Wireless ad-hoc networks are one of the technologies...

    Provided By University Of Zululand

  • White Papers // Sep 2009

    DiCAP: Distributed Packet Capturing Architecture for High-Speed Network Links

    IP traffic measurements form the basis of several network management tasks, such as accounting, planning, intrusion detection, and charging. High-speed network links challenge traditional IP traffic analysis tools with their high amount of carried data that needs to be processed within a small amount of time. Centralized traffic measurements for...

    Provided By University Of Zululand

  • White Papers // Aug 2009

    Energy-Aware Path Selection Metric for IEEE 802.11s Wireless Mesh Networking

    The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for Wireless Mesh Networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However, there are various types of restrictions. The biggest restriction is the confined energy...

    Provided By University Of Zululand

  • White Papers // Jun 2009

    Design and Implementation of a Topology Control Scheme for Wireless Mesh Networks

    The Wireless Mesh Network (WMN) backbone is usually comprised of stationary nodes but the transient nature of wireless links results in changing network topologies. Topology Control (TC) aims to preserve network connectivity in ad hoc and mesh networks and an abundance of theoretical results on the effectiveness of TC exist....

    Provided By University Of Zululand

  • White Papers // Jun 2009

    Performance Evaluation of Routing Metrics for Wireless Mesh Networks

    A routing metric is a measure used by a routing protocol to select a best path, without a routing metric a protocol will not know which path to use to send a packet. A number of routing metrics exist for WMN, but routing still remains a problem for WMN. The...

    Provided By University Of Zululand

  • White Papers // Mar 2009

    Towards Designing Energy-Efficient Routing Protocol for Wireless Mesh Networks

    Different studies have proposed number of routing protocols to overcome data transmission challenges. Very few of these protocols consider node energy. In this study, the state of art work from various studies is reviewed and compared based on the some design criteria that are proposed in this paper. This paper...

    Provided By University Of Zululand

  • White Papers // Feb 2008

    Architectural Concerns for Flexible Data Management

    Evolving DataBase Management Systems (DBMS) towards more flexibility in functionality, adaptation to changing requirements, and extensions with new or different components, is a challenging task. Although many approaches have tried to come up with a flexible architecture, there is no architectural framework that is generally applicable to provide tailor-made data...

    Provided By University Of Zululand

  • White Papers // Jul 2007

    Extending Database Technology: A New Document Data Type

    The authors' research explores a new database extension. Their aim is to see how far it is possible to support collaborative editing and document provenance with database technology, and extend the technology to fully support the data type document. They present an overview of techniques relevant in this area, some...

    Provided By University Of Zululand

  • White Papers // Aug 2011

    A Grid Infrastructure for Knowledge-Based Applications in Open and Dynamic Computing Environments

    The drive towards net-centric applications that enable ubiquitous computing has led to the need for computing systems that operate and interact at knowledge level. In order for this vision to be realised, knowledge need to be modelled as a resource that is made available to computing systems on a global...

    Provided By University Of Zululand

  • White Papers // Nov 2012

    S/T/A: Meta-Modeling Run-Time Adaptation in Component-Based System Architectures

    Modern virtualized system environments usually host diverse applications of different parties and aim at utilizing resources efficiently while ensuring that quality-of-service requirements are continuously satisfied. In such scenarios, complex adaptations to changes in the system environment are still largely performed manually by humans. Over the past decade, autonomic self-adaptation techniques...

    Provided By University Of Zululand

  • White Papers // May 2012

    On Burst Error Correction and Storage Security of Noisy Data

    Secure storage of noisy data for authentication purposes usually involves the use of error correcting codes. The authors propose a new model scenario involving burst errors and present for that several constructions. Sensible data, as e.g. passwords, are usually stored via the use of a one-way hash function, so that...

    Provided By University Of Zululand

  • White Papers // Jul 2012

    Analysis of a Key Distribution Scheme in Secure Multicasting

    This paper presents an analysis of the secure key broadcasting scheme proposed by Wu, Ruan, Lai and Tseng. The study of the parameters of the system is based on a connection with a special type of symmetric equations over finite fields. The authors present two different attacks against the system,...

    Provided By University Of Zululand

  • White Papers // May 2013

    Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures

    The problem of replacing current cryptographic primitives which will be subject to quantum computer attacks with alternative post-quantum solutions is fostering research on code-based systems, which are among the most promising options for this replacement. In this paper, the authors address the problem of achieving efficient code-based digital signatures with...

    Provided By University Of Zululand

  • White Papers // Oct 2011

    On Fuzzy Syndrome Hashing with LDPC Coding

    The last decades have seen a growing interest in hash functions that allow some sort of tolerance, e.g. for the purpose of biometric authentication. Among these, the syndrome fuzzy hashing construction allows to securely store biometric data and to perform user authentication without the need of sharing any secret key....

    Provided By University Of Zululand

  • White Papers // Mar 2009

    Towards Designing Energy-Efficient Routing Protocol for Wireless Mesh Networks

    Different studies have proposed number of routing protocols to overcome data transmission challenges. Very few of these protocols consider node energy. In this study, the state of art work from various studies is reviewed and compared based on the some design criteria that are proposed in this paper. This paper...

    Provided By University Of Zululand

  • White Papers // Aug 2009

    Energy-Aware Path Selection Metric for IEEE 802.11s Wireless Mesh Networking

    The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for Wireless Mesh Networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However, there are various types of restrictions. The biggest restriction is the confined energy...

    Provided By University Of Zululand

  • White Papers // Jun 2009

    Performance Evaluation of Routing Metrics for Wireless Mesh Networks

    A routing metric is a measure used by a routing protocol to select a best path, without a routing metric a protocol will not know which path to use to send a packet. A number of routing metrics exist for WMN, but routing still remains a problem for WMN. The...

    Provided By University Of Zululand

  • White Papers // Jul 2010

    A Test-Bed Evaluation of Connectivity Strategies for Infrastructure Wireless Mesh Networks

    The wireless mesh network backbone is usually comprised of stationary nodes that are not uniformly distributed and connectivity is traditionally assured by requiring that all nodes use their maximum transceiver powers. The use of maximum transceiver powers may actually not be necessary to ensure network connectivity and this realization has...

    Provided By University Of Zululand

  • White Papers // Aug 2010

    Effect of Network Traffic on Duplicate Address Detection in Wireless Ad Hoc Networks

    While much effort has been put in the creation of IP address auto-configuration protocols, very little has been done in testing the different protocols in different network conditions like different network topologies and different types of traffic. IP auto-configuration in mobile ad hoc networks has attracted much attention. Efficient Duplicate...

    Provided By University Of Zululand

  • White Papers // Apr 2010

    Challenges of Evidence Acquisition in Wireless Ad-Hoc Networks

    Network forensics plays a major role in the investigation of criminal activities involving computer networks. Investigating such crimes is still an open research area due to the fact that technology is always advancing hence investigators must always be up-to-date with technological advancements. Wireless ad-hoc networks are one of the technologies...

    Provided By University Of Zululand

  • White Papers // Jun 2009

    Design and Implementation of a Topology Control Scheme for Wireless Mesh Networks

    The Wireless Mesh Network (WMN) backbone is usually comprised of stationary nodes but the transient nature of wireless links results in changing network topologies. Topology Control (TC) aims to preserve network connectivity in ad hoc and mesh networks and an abundance of theoretical results on the effectiveness of TC exist....

    Provided By University Of Zululand

  • White Papers // May 2011

    Comparison of Routing Metrics forWireless Mesh Networks

    A number of routing metrics exist in wireless networks. These routing metrics were originally designed for Mobile Ad hoc NETworks (MANETs). When Wireless Mesh Networks (WMNs) came into being, an idea of introducing and using these routing metrics for WMNs was considered. The problem that arises is that these routing...

    Provided By University Of Zululand

  • White Papers // Aug 2011

    Evaluation of Transport Layer Protocols Over Wireless Multihop Networks

    In a Wireless Multi-hop Network (WMN), numerous QoS mechanisms such as routing, topology control protocol and Transport Layer Protocols (TLPs) have been proposed. The focus of this paper is on the TLPs. TLPs are responsible for connection establishment and attempt to ensure that all data are transmitted from source to...

    Provided By University Of Zululand

  • White Papers // Aug 2011

    Comparative Study of Web Services Platforms in a GUISET Environment

    GUISET (Grid-based Utility Infrastructure for SMME Enabling Technology) architecture aims at delivering e-services to resource-constrained Small Medium and Micro Enterprises (SMMEs) by taking advantage of advances and trends toward Service Oriented Architecture (SOA) within the software industry. A technology that has received widespread adoption within SOA for implementing services is...

    Provided By University Of Zululand

  • White Papers // Aug 2011

    The Effect of DAD Timeout Period on Address Autoconfiguration in Wireless Ad-Hoc Networks

    Lack of manual management mechanisms in wireless ad-hoc networks means that automatic configuration of IP addresses and other related network parameters are very crucial. Many IP address auto-configuration mechanisms have been proposed in literature. These approaches can be categorized as either being stateful or stateless. Stateless protocols employ a Duplicate...

    Provided By University Of Zululand

  • White Papers // Sep 2013

    Scalable Linked Data Stream Processing via Network-Aware Workload Scheduling

    In order to cope with the ever-increasing data volume, distributed stream processing systems have been proposed. To ensure scalability most distributed systems partition the data and distribute the workload among multiple machines. This approach does, however, raise the question how the data and the workload should be partitioned and distributed....

    Provided By University Of Zululand

  • White Papers // Jul 2007

    Extending Database Technology: A New Document Data Type

    The authors' research explores a new database extension. Their aim is to see how far it is possible to support collaborative editing and document provenance with database technology, and extend the technology to fully support the data type document. They present an overview of techniques relevant in this area, some...

    Provided By University Of Zululand

  • White Papers // Sep 2009

    DiCAP: Distributed Packet Capturing Architecture for High-Speed Network Links

    IP traffic measurements form the basis of several network management tasks, such as accounting, planning, intrusion detection, and charging. High-speed network links challenge traditional IP traffic analysis tools with their high amount of carried data that needs to be processed within a small amount of time. Centralized traffic measurements for...

    Provided By University Of Zululand

  • White Papers // Jan 2013

    Bypassing Cloud Providers' Data Validation to Store Arbitrary Data

    A fundamental Software-as-a-Service (SaaS) characteristic in Cloud Computing is to be application-specific; depending on the application, Cloud Providers (CPs) restrict data formats and attributes allowed into their servers via a data validation process. An ill-defined data validation process may directly impact both security (e.g. application failure, legal issues) and accounting...

    Provided By University Of Zululand

  • White Papers // Feb 2008

    Architectural Concerns for Flexible Data Management

    Evolving DataBase Management Systems (DBMS) towards more flexibility in functionality, adaptation to changing requirements, and extensions with new or different components, is a challenging task. Although many approaches have tried to come up with a flexible architecture, there is no architectural framework that is generally applicable to provide tailor-made data...

    Provided By University Of Zululand

  • White Papers // Aug 2014

    Cloud WorkBench - Infrastructure-as-Code Based Cloud Benchmarking

    To optimally deploy their applications, users of Infrastructure-as-a-Service clouds are required to evaluate the costs and performance of different combinations of cloud configurations to find out which combination provides the best service level for their specific application. Unfortunately, benchmarking cloud services is cumbersome and error-prone. In this paper, the authors...

    Provided By University Of Zululand

  • White Papers // Sep 2014

    The Making of Cloud Applications - An Empirical Study on Software Development for the Cloud

    Cloud computing is gaining more and more traction as a deployment and provisioning model for software. While a large body of research already covers how to optimally operate a cloud system, the authors are still lacking insights into how professional software engineers actually use clouds, and how the cloud impacts...

    Provided By University Of Zululand