University Politehnica of Bucharest

Displaying 1-18 of 18 results

  • White Papers // May 2012

    Opening Up Black Box Networks With CloudTalk

    Optimizing distributed applications in the cloud requires network topology information, yet this information is kept confidential by the cloud providers. Today, applications can infer network properties and optimize accordingly but this is costly to get right. The cloud can optimize the network via load balancing, but the scope is limited...

    Provided By University Politehnica of Bucharest

  • White Papers // May 2012

    GRIN: Utilizing the Empty Half of Full Bisection Networks

    Various full bisection designs have been proposed for datacenter networks. The authors are provisioned for the worst case in which every server wishes to send flat out and there is no congestion anywhere in the network. However, these topologies are prone to considerable underutilization in the average case encountered in...

    Provided By University Politehnica of Bucharest

  • White Papers // Feb 2012

    Tele-Market Modelling of Fuzzy Consumer Behaviour

    Just like any other aspect of human life on user's planet, the advancements in internet technology over the past decades have greatly influenced the way users live, changing the socio-political structure of the nations as it can clearly be seen in the Middle East and northern African countries. In specific...

    Provided By University Politehnica of Bucharest

  • White Papers // Jan 2012

    MONARC: A Case Study on Simulation Analysis for LHC Activities

    The scale, complexity and worldwide geographical spread of the LHC computing and data analysis problems are unprecedented in scientific research. The complexity of processing and accessing this data is increased substantially by the size and global span of the major experiments, combined with the limited wide area network bandwidth available....

    Provided By University Politehnica of Bucharest

  • White Papers // Jan 2012

    Heuristics Analysis for Distributed Scheduling Using MONARC Simulation Tool

    Simulation is a very powerful method used for high-performance and high-quality design in distributed system, and now maybe the only one, considering the heterogeneity, complexity and cost of distributed systems. In Grid environments, for example, it is hard and even impossible to perform scheduler performance evaluation in a repeatable and...

    Provided By University Politehnica of Bucharest

  • White Papers // Mar 2011

    Market Research - A Significant Step in Propelling a Business or a Solution for the Egovernment Systems to the Top

    Market research... a real treasure which can trigger performance in any business, but most of the times it seems unexploited at its true value. The marketing analysis brings information about competitors, clients, business partners and so on, guiding the business towards success. Because during the last years the information technologies...

    Provided By University Politehnica of Bucharest

  • White Papers // Mar 2011

    Technologies for Development of the Information Systems: from ERP to e-Government

    Although some ERP (Enterprise Resource Planning) software products are available on the market, they do not entirely fit each and every type of business. That is the main reason why companies prefer to develop their own ERP type of systems, thus eliminating "Barriers" such as long time and high costs...

    Provided By University Politehnica of Bucharest

  • White Papers // Mar 2011

    OCDMA Indoor Wireless Communications System With Mobile Receiver

    In this paper, the authors consider an Optical Code Division Multiple Access (OCDMA) indoor wireless communication system using spectral encoding and evaluate its performances in cases of classical OCDMA, dynamic OCDMA and OCDMA with deconvolution. They present an analysis of the receiver movement influence on the indoor wireless communications system...

    Provided By University Politehnica of Bucharest

  • White Papers // Jan 2011

    BitTorrent Swarm Analysis Through Automation and Enhanced Logging

    Peer-to-Peer protocols currently form the most heavily used protocol class in the Internet, with BitTorrent, the most popular protocol for content distribution, as its flagship. A high number of studies and investigations have been undertaken to measure, analyse and improve the inner workings of the BitTorrent protocol. Approaches such as...

    Provided By University Politehnica of Bucharest

  • White Papers // Dec 2010

    Implementation of an Adaptive Synchronizing Protocol for Energy Saving in Wireless Sensor Networks

    In this paper the authors present an efficient protocol intended to save energy inside wireless sensor networks, thus increasing their lifetime. The authors offer a detailed description of the network model, topology, energy management and data synchronization to properly evaluate the performance of the proposed Adaptive Synchronizing Protocol. The authors...

    Provided By University Politehnica of Bucharest

  • White Papers // Nov 2010

    Managing Data Access on Clouds: A Generic Framework for Enforcing Security Policies

    Recently there has been a great need to provide an adequate security level in Cloud Environments, as they are vulnerable to various attacks. Malicious behaviors such as Denial of Service attacks, especially when targeting large-scale data management systems, cannot be detected by typical authentication mechanisms and are responsible for drastically...

    Provided By University Politehnica of Bucharest

  • White Papers // Jul 2010

    Voice Adaptive Gateway Pacer for Wireless Multihop Networks

    When supporting both voice and TCP in a wireless multi-hop network, there are two conflicting goals: to protect the VoIP traffic, and to completely utilize the remaining capacity for TCP. The authors investigate the interaction between these two popular categories of traffic and find that conventional solution approaches, such as...

    Provided By University Politehnica of Bucharest

  • White Papers // Jun 2010

    Fast Convergence Least-Mean-Square Algorithms for MMSE Receivers in DS-CDMA Systems

    This paper considers a Minimum Mean-Squared Error (MMSE) single user adaptive receiver for the asynchronous Direct-Sequence Code-Division Multiple-Access (DS-CDMA) system, based on the Least-Mean-Square (LMS) algorithm. It is known that in this context the adaptive algorithm can be iterated several times during the same bit interval in order to achieve...

    Provided By University Politehnica of Bucharest

  • White Papers // Jun 2010

    Finding Inter-Domain QoS Enabled Routes Using an Overlay Topology Approach

    The transport of multimedia flows over the Internet needs to manage and control end to end Quality of Services (QoS) at transport level. One problem, which needs to be solved in this case, is finding inter-domain QoS enabled paths. This paper deals with the problem of establishing QoS enabled aggregated...

    Provided By University Politehnica of Bucharest

  • White Papers // May 2010

    Architectural Views for Designing Relationships in Distributed Systems

    The paper studies the detailed design of relationships between concepts, taking into account four architectural views: logical, process, implementation and deployment. The classical patterns, applied if one considers the conceptual relationships from the logical view, are not enough for distributed applications, because the related elements may pertain to different computing...

    Provided By University Politehnica of Bucharest

  • White Papers // May 2010

    Transnational Companies And Production Global Networks

    Internationalizing a company is an objective process. The historical reality shows that, while developing, the company tends to exceed its local, national and regional limits of business environment, in order to expand its activity into the global economic space, whose formatting is possible through the very company's movement towards exterior....

    Provided By University Politehnica of Bucharest

  • White Papers // Sep 2009

    Approximating Mathematical Semantic Web Services Using Approximation Formulas and Numerical Methods

    Mathematical semantic web services are very useful in practice, but only a small number of research results are reported in this area. In this paper the authors present a method of obtaining an approximation of a mathematical semantic web service, from its semantic description, using existing mathematical semantic web services,...

    Provided By University Politehnica of Bucharest

  • White Papers // Jul 2009

    General Guidelines for the Security of a Large Scale Data Center Design

    The security of a large scale data center is based on an effective security policy that defines the requirements to protect network resources from internal and external security threats and ensures data privacy and integrity. This paper summarizes the layered security principles and how they have been applied in the...

    Provided By University Politehnica of Bucharest

  • White Papers // Feb 2012

    Tele-Market Modelling of Fuzzy Consumer Behaviour

    Just like any other aspect of human life on user's planet, the advancements in internet technology over the past decades have greatly influenced the way users live, changing the socio-political structure of the nations as it can clearly be seen in the Middle East and northern African countries. In specific...

    Provided By University Politehnica of Bucharest

  • White Papers // Mar 2011

    Market Research - A Significant Step in Propelling a Business or a Solution for the Egovernment Systems to the Top

    Market research... a real treasure which can trigger performance in any business, but most of the times it seems unexploited at its true value. The marketing analysis brings information about competitors, clients, business partners and so on, guiding the business towards success. Because during the last years the information technologies...

    Provided By University Politehnica of Bucharest

  • White Papers // Mar 2011

    Technologies for Development of the Information Systems: from ERP to e-Government

    Although some ERP (Enterprise Resource Planning) software products are available on the market, they do not entirely fit each and every type of business. That is the main reason why companies prefer to develop their own ERP type of systems, thus eliminating "Barriers" such as long time and high costs...

    Provided By University Politehnica of Bucharest

  • White Papers // May 2010

    Architectural Views for Designing Relationships in Distributed Systems

    The paper studies the detailed design of relationships between concepts, taking into account four architectural views: logical, process, implementation and deployment. The classical patterns, applied if one considers the conceptual relationships from the logical view, are not enough for distributed applications, because the related elements may pertain to different computing...

    Provided By University Politehnica of Bucharest

  • White Papers // Jul 2009

    General Guidelines for the Security of a Large Scale Data Center Design

    The security of a large scale data center is based on an effective security policy that defines the requirements to protect network resources from internal and external security threats and ensures data privacy and integrity. This paper summarizes the layered security principles and how they have been applied in the...

    Provided By University Politehnica of Bucharest

  • White Papers // Dec 2010

    Implementation of an Adaptive Synchronizing Protocol for Energy Saving in Wireless Sensor Networks

    In this paper the authors present an efficient protocol intended to save energy inside wireless sensor networks, thus increasing their lifetime. The authors offer a detailed description of the network model, topology, energy management and data synchronization to properly evaluate the performance of the proposed Adaptive Synchronizing Protocol. The authors...

    Provided By University Politehnica of Bucharest

  • White Papers // Jan 2011

    BitTorrent Swarm Analysis Through Automation and Enhanced Logging

    Peer-to-Peer protocols currently form the most heavily used protocol class in the Internet, with BitTorrent, the most popular protocol for content distribution, as its flagship. A high number of studies and investigations have been undertaken to measure, analyse and improve the inner workings of the BitTorrent protocol. Approaches such as...

    Provided By University Politehnica of Bucharest

  • White Papers // Sep 2009

    Approximating Mathematical Semantic Web Services Using Approximation Formulas and Numerical Methods

    Mathematical semantic web services are very useful in practice, but only a small number of research results are reported in this area. In this paper the authors present a method of obtaining an approximation of a mathematical semantic web service, from its semantic description, using existing mathematical semantic web services,...

    Provided By University Politehnica of Bucharest

  • White Papers // May 2010

    Transnational Companies And Production Global Networks

    Internationalizing a company is an objective process. The historical reality shows that, while developing, the company tends to exceed its local, national and regional limits of business environment, in order to expand its activity into the global economic space, whose formatting is possible through the very company's movement towards exterior....

    Provided By University Politehnica of Bucharest

  • White Papers // Nov 2010

    Managing Data Access on Clouds: A Generic Framework for Enforcing Security Policies

    Recently there has been a great need to provide an adequate security level in Cloud Environments, as they are vulnerable to various attacks. Malicious behaviors such as Denial of Service attacks, especially when targeting large-scale data management systems, cannot be detected by typical authentication mechanisms and are responsible for drastically...

    Provided By University Politehnica of Bucharest

  • White Papers // Jun 2010

    Fast Convergence Least-Mean-Square Algorithms for MMSE Receivers in DS-CDMA Systems

    This paper considers a Minimum Mean-Squared Error (MMSE) single user adaptive receiver for the asynchronous Direct-Sequence Code-Division Multiple-Access (DS-CDMA) system, based on the Least-Mean-Square (LMS) algorithm. It is known that in this context the adaptive algorithm can be iterated several times during the same bit interval in order to achieve...

    Provided By University Politehnica of Bucharest

  • White Papers // Jun 2010

    Finding Inter-Domain QoS Enabled Routes Using an Overlay Topology Approach

    The transport of multimedia flows over the Internet needs to manage and control end to end Quality of Services (QoS) at transport level. One problem, which needs to be solved in this case, is finding inter-domain QoS enabled paths. This paper deals with the problem of establishing QoS enabled aggregated...

    Provided By University Politehnica of Bucharest

  • White Papers // Mar 2011

    OCDMA Indoor Wireless Communications System With Mobile Receiver

    In this paper, the authors consider an Optical Code Division Multiple Access (OCDMA) indoor wireless communication system using spectral encoding and evaluate its performances in cases of classical OCDMA, dynamic OCDMA and OCDMA with deconvolution. They present an analysis of the receiver movement influence on the indoor wireless communications system...

    Provided By University Politehnica of Bucharest

  • White Papers // Jul 2010

    Voice Adaptive Gateway Pacer for Wireless Multihop Networks

    When supporting both voice and TCP in a wireless multi-hop network, there are two conflicting goals: to protect the VoIP traffic, and to completely utilize the remaining capacity for TCP. The authors investigate the interaction between these two popular categories of traffic and find that conventional solution approaches, such as...

    Provided By University Politehnica of Bucharest

  • White Papers // Jan 2012

    MONARC: A Case Study on Simulation Analysis for LHC Activities

    The scale, complexity and worldwide geographical spread of the LHC computing and data analysis problems are unprecedented in scientific research. The complexity of processing and accessing this data is increased substantially by the size and global span of the major experiments, combined with the limited wide area network bandwidth available....

    Provided By University Politehnica of Bucharest

  • White Papers // Jan 2012

    Heuristics Analysis for Distributed Scheduling Using MONARC Simulation Tool

    Simulation is a very powerful method used for high-performance and high-quality design in distributed system, and now maybe the only one, considering the heterogeneity, complexity and cost of distributed systems. In Grid environments, for example, it is hard and even impossible to perform scheduler performance evaluation in a repeatable and...

    Provided By University Politehnica of Bucharest

  • White Papers // May 2012

    Opening Up Black Box Networks With CloudTalk

    Optimizing distributed applications in the cloud requires network topology information, yet this information is kept confidential by the cloud providers. Today, applications can infer network properties and optimize accordingly but this is costly to get right. The cloud can optimize the network via load balancing, but the scope is limited...

    Provided By University Politehnica of Bucharest

  • White Papers // May 2012

    GRIN: Utilizing the Empty Half of Full Bisection Networks

    Various full bisection designs have been proposed for datacenter networks. The authors are provisioned for the worst case in which every server wishes to send flat out and there is no congestion anywhere in the network. However, these topologies are prone to considerable underutilization in the average case encountered in...

    Provided By University Politehnica of Bucharest