Vienna University of Economics and Business

Displaying 1-40 of 154 results

  • White Papers // Nov 2014

    From Declarative Processes to Imperative Models

    Now-a-days, organizations support their creation of value by explicitly defining the processes to be carried out. Processes are specifically discussed from the angle of simplicity, i.e., how compact and easy to understand they can be represented. In most cases, organizations rely on imperative models which, however, become complex and cluttered...

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2014

    ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors

    Android is the most popular Smartphone operating system with a market share of 80%, but as a consequence, also the platform most targeted by malware. To deal with the increasing number of malicious Android apps in the wild, malware analysts typically rely on analysis tools to extract characteristic information about...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2014

    AndRadar: Fast Discovery of Android Applications in Alternative Markets

    Compared to traditional desktop software, Android applications are delivered through software repositories, commonly known as application markets. Other mobile platforms, such as Apple iOS and BlackBerry OS also use the marketplace model, but what is unique to Android is the existence of a plethora of alternative application markets. This complicates...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2014

    Enter Sandbox: Android Sandbox Comparison

    Expecting the shipment of 1 billion Android devices in 2017, cyber criminals have naturally extended their vicious activities towards Google's mobile operating system. With an estimated number of 700 new Android applications released every day, keeping control over malware is an increasingly challenging task. In recent years, a vast number...

    Provided By Vienna University of Economics and Business

  • White Papers // Jan 2014

    General-Purpose Graphics Processing Units in Service-Oriented Architectures

    Over the last decades, graphics processing units have developed from special-purpose graphics accelerators to general-purpose massively parallel co-processors. In recent years they gained increased traction in high performance computing, as they provide superior computational performance in terms of runtime and energy consumption for a wide range of problems. In this...

    Provided By Vienna University of Economics and Business

  • White Papers // Dec 2013

    Take a Bite - Finding the Worm in the Apple

    When it comes to security risks, especially malware, Mac OS X has the questionable reputation of being inherently safe. While there is a substantial body of research and implementations dealing with malware on Windows and, more recently, Android systems, Mac OS X has received little attention so far. To amend...

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2013

    A Framework and Middleware for Application-Level Cloud Bursting on Top of Infrastructure-as-a-Service Clouds

    A core idea of cloud computing is elasticity, i.e., enabling applications to adapt to varying load by dynamically acquiring and releasing cloud resources. One concrete realization is cloud bursting, which is the migration of applications or parts of applications running in a private cloud to a public cloud to cover...

    Provided By Vienna University of Economics and Business

  • White Papers // Jul 2013

    Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations

    Dowser is a 'Guided' fuzzer that combines taint tracking, program analysis and symbolic execution to find buffer overflow and underflow vulnerabilities buried deep in a program's logic. The key idea is that analysis of a program lets the users pinpoint the right areas in the program code to probe and...

    Provided By Vienna University of Economics and Business

  • White Papers // Jul 2013

    Interactive Visual Transformation for Symbolic Representation of Time-oriented Data

    Data mining on time-oriented data has many real-world applications, like optimizing shift plans for shops or hospitals, or analyzing traffic or climate. As those data are often very large and multi-variate, several methods for symbolic representation of time-series have been proposed. Some of them are statistically robust, have a lower-bound...

    Provided By Vienna University of Economics and Business

  • White Papers // Jul 2013

    A View To A Kill: WebView Exploitation

    WebView is a technique to mingle web and native applications for mobile devices. The fact that its main incentive requires making data stored on, as well as the functionality of mobile devices, directly accessible to active web content, is not without consequences to security. In this paper, the authors present...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2013

    Evolving Graph Databases Under Description Logic Constraints

    In the setting of graph-structured data, description logics are well suited to impose constraints that capture the semantics of the do-main of interest. When the data evolves as a result of operations carried out by users or applications, it is important to ensure that the satisfaction of the constraints is...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2013

    RESTful Business Process Management in the Cloud

    As more and more business processes are migrated into cloud-based runtimes, there is a need to manage their state to provide support for quality attributes such as elasticity, scalability and dependability. In this paper, the authors discuss how the REST architectural style provides a sensible choice to manage and publish...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2013

    SOA Model for High Availability of Services

    Service-Oriented Architecture (SOA) provides reusability and enables easy functionality integration. Service availability in SOA is important as it is used by safety critical systems, telecommunication systems and business systems. Service unavailability can result in reduced profits, reputation damage and reduced safety. Machine virtualization, clusters and group communication systems are used...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2013

    Minimum Variance Estimation of a Sparse Vector Within the Linear Gaussian Model: An RKHS Approach

    The authors consider minimum variance estimation within the Sparse Linear Gaussian Model (SLGM). A sparse vector is to be estimated from a linearly transformed version embedded in Gaussian noise. Their analysis is based on the theory of Reproducing Kernel Hilbert Spaces (RKHS). After a characterization of the RKHS associated with...

    Provided By Vienna University of Economics and Business

  • White Papers // Mar 2013

    Efficient Updates of Uncertain Databases

    Uncertain databases have evolved as an active area of database research, surveyed, for example, in. The possible world's semantics is commonly used to deal with uncertain data. Several representation systems for uncertain data-bases have been proposed to provide efficient storage and query facilities for a potentially big number of possible...

    Provided By Vienna University of Economics and Business

  • White Papers // Mar 2013

    Toward a Cloud-Based Integration of IR Tools

    In this paper, the authors present the case for creating a cloud-based infrastructure for IR. The infrastructure should provide access to multiple components of IR systems and a method to easily integrate them in various configurations, as well as data and parameters used in IR experiments. Workflow tools are promising...

    Provided By Vienna University of Economics and Business

  • White Papers // Mar 2013

    Securing a Space-Based Service Architecture With Coordination-Driven Access Control

    In distributed applications, multiple autonomous processes need to collaborate in an efficient way. Space-based middleware enables data-driven coordination for these processes via shared tuple spaces that allow a decoupled form of communication. Complex coordination logic may be provided to clients via reusable service components that access such tuple spaces to...

    Provided By Vienna University of Economics and Business

  • White Papers // Mar 2013

    dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection

    In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operating system kernel provides an extremely powerful tool. Kernel-level code can introduce hard to detect backdoors, provide stealth by hiding les, processes or other...

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2013

    M2M Platform-as-a-Service for Sustainability Governance

    Recently, cloud computing technologies have been employed for large-scale Machine-To-Machine (M2M) systems, as they could potentially offer better solutions for managing monitoring data and analytics applications to support the needs of different consumers. However, there exist complex relationships between monitored objects, monitoring data, analysis features, and stakeholders in M2M that...

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2013

    Application-Level Performance Monitoring of Cloud Services Based on the Complex Event Processing Paradigm

    Monitoring of applications deployed to Infrastructure-as-a-Service clouds is still an open problem. In this paper, the authors discuss an approach based on the complex event processing paradigm, which allows application developers to specify and monitor high-level application performance metrics. They use the case of a Web 2.0 sentiment analysis application...

    Provided By Vienna University of Economics and Business

  • White Papers // Jan 2013

    Lines of Malicious Code: Insights Into the Malicious Software Industry

    Malicious software installed on infected computers is a fundamental component of online crime. Malware development thus plays an essential role in the underground economy of cyber-crime. Malware authors regularly update their software to defeat defenses or to support new or improved criminal business models. A large body of research has...

    Provided By Vienna University of Economics and Business

  • White Papers // Nov 2012

    Vanity, Cracks and Malware

    Today, a large amount of software products include mechanisms to counter software piracy. However, most protection mechanisms can be easily circumvented by applying soft-ware patches (cracks) or license key generators (keygens) with seemingly no financial incentives. The authors' research shows that the distribution of cracks and keygens not only al-lows...

    Provided By Vienna University of Economics and Business

  • White Papers // Oct 2012

    Automatic SLA Matching and Provider Selection in Grid and Cloud Computing Markets

    Cloud computing is a novel computing paradigm that offers data, software, and hardware services in a manner similar to traditional utilities such as water, electricity, and telephony. Usually, in Cloud and Grid computing, contracts between traders are established using Service Level Agreements (SLAs), which include objectives of service usage. However,...

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2012

    Conflict Visualization for Evolving UML Models

    The urgent demand for supporting teamwork and continuous evolution of software models triggered intensive research on optimistic version control systems for models. State-of-the-art model versioning approaches primarily focus on detecting changes and conflicts between concurrently evolved versions of a model. However, techniques for conflict visualization have been hardly investigated yet....

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2012

    Optimized Execution of Business Processes on Crowdsourcing Platforms

    Crowdsourcing in enterprises is a promising approach for organizing a flexible workforce. Recent developments show that the idea gains additional momentum. However, an obstacle for widespread adoption is the lack of an integrated way to execute business processes based on a crowdsourcing platform. The main difference compared to traditional approaches...

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2012

    Cloud Security and Privacy in the Light of the 2012 EU Data Protection Regulation

    The essential characteristics of cloud computing such as elasticity or broad network access provide many economic benefits for their users, but with these benefits also many security and privacy risks come along. These risks can be generally classified into legal and technical risks. The upcoming general data protection regulation by...

    Provided By Vienna University of Economics and Business

  • White Papers // Aug 2012

    Virtualizing Software and Humans for Elastic Processes in Multiple Clouds - A Service Management Perspective

    There is a growing trend of combining human-based computation with machine-based computation to solve complex problems which cannot be answered with machine-based computation alone. From the computing perspective, integrating machine-based computing elements with human-based computing elements and provisioning them under the same model will facilitate the resource elasticity required by...

    Provided By Vienna University of Economics and Business

  • White Papers // Aug 2012

    Self-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures

    Cloud providers aim at guaranteeing Service Level Agreements (SLAs) in a resource-efficient way. This, amongst others, means that resources of Virtual (VMs) and Physical Machines (PMs) have to be autonomically allocated responding to external influences as workload or environmental changes. Thereby, Workload Volatility (WV) is one of the crucial factors...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2012

    Data Cache Organization for Accurate Timing Analysis

    Caches are essential to bridge the gap between the high latency main memory and the fast processor pipeline. Standard processor architectures implement two first-level caches to avoid a structural hazard in the pipeline: an instruction cache and a data cache. For tight worst-case execution times it is important to classify...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2012

    Identifying Incompatible Implementations of Industry Standard Service Interfaces for Dependable Service-Based Applications

    In this paper, the authors study fault localization techniques for identification of incompatible configurations and implementations in Service-Based Applications (SBAs). They consider SBAs with abstract service interfaces that integrate multiple concrete service implementations from various providers. Practice has shown that standardized interfaces alone do not guarantee compatibility of services originating...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2012

    Enhanced Sharing and Privacy in Collaborative Virtual Teams

    Privacy concerns keep users from sharing required information in a collaborative environment. There is a need of privacy preserving methods that can enhance flow of information among collaborating users in dynamic teams without compromising their privacy. The authors describe a user-defined role-based sharing control model and architecture that uses hybrid...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Automation Possibilities in Information Security Management

    Information security management, as defined in ISO 27001, deals with establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an information security management system. This paper provides an analysis about the automation possibilities in information security management. The analysis takes into account the potential of using security ontologies in risk management,...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Tor HTTP Usage and Information Leakage

    This paper analyzes the web browsing behavior of Tor users. By collecting HTTP requests the authors show which websites are of interest to Tor users and they determined an upper bound on how vulnerable Tor users are to sophisticated de-anonymization attacks: up to 78 % of the Tor users do...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Ethics in Security Research Which Lines Should Not Be Crossed?

    Recently, several research papers in the area of information security were published that may or may not be considered unethical. Looking at these borderline cases is relevant as today's research papers will influence how young researchers conduct their research. In this paper, the authors discuss fundamental ethical principles and their...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Adaptive Channel Direction Quantization Based on Spherical Prediction

    In this paper, the authors present algorithms for the quantization of a correlated unit norm random vector process. Such algorithms are important, e.g., for channel vector quantization in wireless communication systems. Starting from a quantization codebook that uniformly quantizes the unit sphere, they propose to iteratively adapt the codebook to...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Joint Network-Channel Coding for the Asymmetric Multiple-Access Relay Channel

    In this paper, the authors consider the time-division Multiple Access Relay Channel (MARC). They propose a low-complexity compress-and-forward-based transmission scheme that consists of a scalar quantization of Log-Likelihood Ratios (LLRs), followed by a suitably defined network code. This scheme is well suited also for asymmetric source-relay channel conditions. They use...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Accurate SINR Estimation Model for System Level Simulation of LTE Networks

    This paper presents an SINR prediction model for LTE systems with the aim of improving the accuracy of physical layer models used for higher-than-physical-level simulations. This physical layer SINR abstraction for zero-forcing receivers takes channel estimation errors into account. It allows for the calculation of the post-equalization receive SINR of...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Workflow-Based Composition and Testing of Combined e-services and components

    Information systems are increasingly built using component models such as Enterprise Java Beans, COM+, or CORBA objects. Dynamically aggregated and composed Web services can be seen as a newly emerging research area for Service Oriented Architectures, which are combined with components. The authors' paper presents three main arguments: that composition...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Semantic Inter-Organizational Performance Analysis Using the Balanced Scorecard Methodology

    Evaluating Inter-Organizational Relationships (IORs) is important in today's businesses for increasing competitiveness and business potential. Typically, IORs are measured by high-level Key Performance Indicators (KPIs) such as trust, knowledge sharing, and others. However, these high-level KPIs are difficult to be measured quantitatively. It is therefore difficult to determine IORs and...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2012

    Energy Efficient Service Delivery in Clouds in Compliance with the Kyoto Protocol

    Cloud computing is revolutionizing the ICT landscape by providing scalable and efficient computing resources on demand. The ICT industry - especially data centers, are responsible for considerable amounts of CO2 emissions and will very soon be faced with legislative restrictions, such as the Kyoto protocol, defining caps at different organizational...

    Provided By Vienna University of Economics and Business

  • White Papers // Jan 2014

    General-Purpose Graphics Processing Units in Service-Oriented Architectures

    Over the last decades, graphics processing units have developed from special-purpose graphics accelerators to general-purpose massively parallel co-processors. In recent years they gained increased traction in high performance computing, as they provide superior computational performance in terms of runtime and energy consumption for a wide range of problems. In this...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2009

    Comparison of Implicit Path Enumeration and Model Checking Based WCET Analysis

    In this paper, the authors present their new Worst-Case Execution Time (WCET) analysis tool for Java processors, supporting both Implicit Path EnumeraTion (IPET) and model checking based execution time estimation. Even though model checking is significantly more expensive than IPET, it simplifies accurate modeling of pipelines and caches. Experimental results...

    Provided By Vienna University of Economics and Business

  • White Papers // Dec 2008

    Time-Predictable Cache Organization

    Caches are a mandatory feature of current processors to deliver instructions and data to a fast processor pipeline. However, standard cache organizations are designed to increase the average case performance. They are hard to model for Worst-Case Execution Time (WCET) analysis. Unknown abstract cache states during the analysis result in...

    Provided By Vienna University of Economics and Business

  • White Papers // Jan 2009

    Embedded JIT Compilation with CACAO on YARI

    Java is one of the most popular programming languages for the development of portable workstation and server applications available today. Because of its clean design and type-safety, it is also becoming attractive in the domain of embedded systems. Unfortunately, the dynamic features of the language and its rich class library...

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2008

    Toward Libraries for Real-Time Java

    Reusable libraries are problematic for real-time software in java. Using java's standard class library, for example, demands meticulous coding and testing to avoid response time spikes and garbage collection. The authors propose two design requirements for reusable libraries in real-time systems: Worst-Case Execution Time (WCET) bounds and worst-case memory consumption...

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2008

    Hardware Objects for Java

    Java, as a safe and platform independent language, avoids access to low-level I/O devices or direct memory access. In standard java, low-level I/O it not a concern; it is handled by the operating system. However, in the embedded domain resources are scarce and a Java Virtual Machine (JVM) without an...

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2008

    A Modular Worst-Case Execution Time Analysis Tool for Java Processors

    Recent technologies such as the real-time specification for java promise to bring java's advantages to real-time systems. While these technologies have made Java more predictable, they lack a crucial element: support for determining the Worst-Case Execution Time (WCET). Without knowledge of WCET, the correct temporal behavior of a java program...

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2007

    SimpCon - a Simple and Efficient SoC Interconnect

    To build a System-on-Chip (SoC) a common interface standard is necessary to connect ready-to-use components from different vendors. Today several SoC interconnect standards, such as AMBA, Wishbone, OPB, and Avalon, are in use. In this paper, the authors show that those standards have a common drawback for on-chip interconnections: they...

    Provided By Vienna University of Economics and Business

  • White Papers // Jan 2011

    Hardware Synchronization for Embedded Multi-Core Processors

    Multi-core processors are about to conquer embedded systems - it is not the question of whether they are coming but how the architectures of the microcontrollers should look with respect to the strict requirements in the field. The authors present the step from one to multiple cores in this paper,...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2010

    Design and Implementation of Real-Time Transactional Memory

    Transactional memory is a promising, optimistic synchronization mechanism for chip-multiprocessor systems. The simplicity of atomic sections, instead of using explicit locks, is also appealing for real-time systems. In this paper an implementation of Real-Time Transactional Memory (RTTM) in the paper of a real-time java Chip Multi-Processor (CMP) is presented. To...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2009

    Design Space Exploration for Java Processors with Cross-Profiling

    Most processors are used in embedded systems, where the processor architectures are diverse due to optimizations for different application domains. The main challenge for embedded system processors is the right balance between performance and chip size, which directly relates to cost. An early estimation of the performance for a new...

    Provided By Vienna University of Economics and Business

  • White Papers // Jul 2009

    Is Chip-Multiprocessing the End of Real-Time Scheduling?

    Chip Multi-Processing (CMP) is considered the future path for performance enhancements in computer architecture. Eight processor cores on a single chip are state-of-the art and several hundreds of cores on a single die are expected in the near future. General purpose computing is facing the challenge how to use the...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2007

    A Time-Triggered Network-on-Chip

    In this paper, the authors propose a time-triggered Network-on-Chip (NoC) for on-chip real-time systems. The NoC provides time predictable on- and off-chip communication, a mandatory feature for dependable real-time systems. A regular structured NoC with a pseudo-static communication schedule allows for a high bandwidth. In this paper, they argue for...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2007

    Time Predictable CPU and DMA Shared Memory Access

    In this paper, the authors propose a first step towards a time predictable computer architecture for single Chip Multi-Processing (CMP). CMP is the actual trend in server and desktop systems. CMP is even considered for embedded real-time systems, where Worst-Case Execution Time (WCET) estimates are of primary importance. They attack...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2006

    An Embedded Support Vector Machine

    In this paper, the authors work on the balance between hardware and software implementation of a machine learning algorithm, which belongs to the area of statistical learning theory. They use system-on-chip technology to demonstrate the potential usefulness of moving the critical sections of an algorithm into hardware: the so-called hardware/software...

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2006

    Real-Time Garbage Collection for Java

    Automatic memory management or garbage collection greatly simplifies the development of large systems. However, garbage collection is usually not used in real-time systems due to the unpredictable temporal behavior of current implementations of a garbage collector. In this paper, the authors propose a concurrent collector that is scheduled periodically in...

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2008

    Application Experiences with a Real-Time Java Processor

    In this paper, the authors present three different industrial real-time applications that are based on an embedded java processor. Although from different application domains all three projects have one topic in common: communication. Today's embedded systems are networked systems. Either a proprietary protocol is used due to legacy applications or...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2012

    Data Cache Organization for Accurate Timing Analysis

    Caches are essential to bridge the gap between the high latency main memory and the fast processor pipeline. Standard processor architectures implement two first-level caches to avoid a structural hazard in the pipeline: an instruction cache and a data cache. For tight worst-case execution times it is important to classify...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2009

    JOP: A Java Optimized Processor

    Java is still not a common language for embedded systems. It posses language features, like thread support, that can improve embedded system development, but common implementations as interpreter or just-in-time compiler are not practical. Java Optimized Processor (JOP) is a hardware implementation of the java virtual machine with focus on...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2009

    Design Decisions for a Java Processor

    In this paper, the authors describe design decisions for a Java Optimized Processor (JOP), implemented in an FPGA. FPGA density-price relationship makes it now possible to consider them not only for prototyping of processor designs but also as final implementation technology. However, using an FPGA as target platform for a...

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2014

    ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors

    Android is the most popular Smartphone operating system with a market share of 80%, but as a consequence, also the platform most targeted by malware. To deal with the increasing number of malicious Android apps in the wild, malware analysts typically rely on analysis tools to extract characteristic information about...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2014

    AndRadar: Fast Discovery of Android Applications in Alternative Markets

    Compared to traditional desktop software, Android applications are delivered through software repositories, commonly known as application markets. Other mobile platforms, such as Apple iOS and BlackBerry OS also use the marketplace model, but what is unique to Android is the existence of a plethora of alternative application markets. This complicates...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2014

    Enter Sandbox: Android Sandbox Comparison

    Expecting the shipment of 1 billion Android devices in 2017, cyber criminals have naturally extended their vicious activities towards Google's mobile operating system. With an estimated number of 700 new Android applications released every day, keeping control over malware is an increasingly challenging task. In recent years, a vast number...

    Provided By Vienna University of Economics and Business

  • White Papers // Dec 2013

    Take a Bite - Finding the Worm in the Apple

    When it comes to security risks, especially malware, Mac OS X has the questionable reputation of being inherently safe. While there is a substantial body of research and implementations dealing with malware on Windows and, more recently, Android systems, Mac OS X has received little attention so far. To amend...

    Provided By Vienna University of Economics and Business

  • White Papers // Jul 2013

    A View To A Kill: WebView Exploitation

    WebView is a technique to mingle web and native applications for mobile devices. The fact that its main incentive requires making data stored on, as well as the functionality of mobile devices, directly accessible to active web content, is not without consequences to security. In this paper, the authors present...

    Provided By Vienna University of Economics and Business

  • White Papers // Nov 2014

    From Declarative Processes to Imperative Models

    Now-a-days, organizations support their creation of value by explicitly defining the processes to be carried out. Processes are specifically discussed from the angle of simplicity, i.e., how compact and easy to understand they can be represented. In most cases, organizations rely on imperative models which, however, become complex and cluttered...

    Provided By Vienna University of Economics and Business

  • White Papers // Mar 2013

    Efficient Updates of Uncertain Databases

    Uncertain databases have evolved as an active area of database research, surveyed, for example, in. The possible world's semantics is commonly used to deal with uncertain data. Several representation systems for uncertain data-bases have been proposed to provide efficient storage and query facilities for a potentially big number of possible...

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2010

    The Great Recession Versus The Great Depression: Stylized Facts On Siblings That Were Given Different Foster Parents

    This paper compares the depth of the Recent Crisis and the Great Depression. The authors use a new data set to compare the drop in activity in the industrialized countries for seven activity indicators. This is done under the assumption that the Recent Crisis leveled off in mid-2009 for production...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2010

    Leadership And Public Service Motivation In A Weberian Public Administration - A German-Austrian Comparative Perspective

    A central question for the future of applied Public Service Motivation (PSM) research is whether PSM influences leadership behavior and to which extent. To address this question, the authors focus on public sector executives in two German speaking countries with their specific Weberian legalistic Rechtsstaat-tradition, characterized by a quite distinct...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2010

    Do We Need Any More Hierarchical Structures? Combining Vertical And Shared Leadership Considering The Organizational Culture, Structures And Processes

    In spite of decades of leadership research and numerous leadership theories no unequivocal recipe for success could be found for the leading of employees. Complex tasks, increasing competitive pressure and insecurity complicate this because innovative and flexible activities are not possible in rigid hierarchical structures. The expectations of highly qualified...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Adaptive Channel Direction Quantization Based on Spherical Prediction

    In this paper, the authors present algorithms for the quantization of a correlated unit norm random vector process. Such algorithms are important, e.g., for channel vector quantization in wireless communication systems. Starting from a quantization codebook that uniformly quantizes the unit sphere, they propose to iteratively adapt the codebook to...

    Provided By Vienna University of Economics and Business

  • White Papers // Mar 2012

    Users in Cells: a Data Traffic Analysis

    The authors present a large-scale cell based measurement analysis of the user behavior in a live operational HSDPA network. The motivations are: first, to understand the statistical properties of users in cells for refining network planning procedures; and second, to provide realistic traffic models for simulations of cellular packet-oriented networks....

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Joint Network-Channel Coding for the Asymmetric Multiple-Access Relay Channel

    In this paper, the authors consider the time-division Multiple Access Relay Channel (MARC). They propose a low-complexity compress-and-forward-based transmission scheme that consists of a scalar quantization of Log-Likelihood Ratios (LLRs), followed by a suitably defined network code. This scheme is well suited also for asymmetric source-relay channel conditions. They use...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Accurate SINR Estimation Model for System Level Simulation of LTE Networks

    This paper presents an SINR prediction model for LTE systems with the aim of improving the accuracy of physical layer models used for higher-than-physical-level simulations. This physical layer SINR abstraction for zero-forcing receivers takes channel estimation errors into account. It allows for the calculation of the post-equalization receive SINR of...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2012

    Energy Efficient Service Delivery in Clouds in Compliance with the Kyoto Protocol

    Cloud computing is revolutionizing the ICT landscape by providing scalable and efficient computing resources on demand. The ICT industry - especially data centers, are responsible for considerable amounts of CO2 emissions and will very soon be faced with legislative restrictions, such as the Kyoto protocol, defining caps at different organizational...

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2009

    Testbedding MIMO HSDPA and WiMAX

    Modern wireless communication systems employ MIMO and feedback - two properties that make it especially difficult to measure the performance of such systems with reasonable effort in actual outdoor scenarios. In this paper, the authors will present a time, cost, and manpower efficient measurement approach to evaluate the throughput achieved...

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2009

    MIMO HSDPA Throughput Measurement Results in an Urban Scenario

    In this paper, the authors report on results of MIMO High Speed Downlink Packet Access (HSDPA) throughput measurements. These measurements were carried out in an urban scenario. Besides the standard compliant SISO and two transmit antenna schemes, they defined and measured also a four antenna scheme. In all throughput measurements...

    Provided By Vienna University of Economics and Business

  • White Papers // Jan 2013

    Lines of Malicious Code: Insights Into the Malicious Software Industry

    Malicious software installed on infected computers is a fundamental component of online crime. Malware development thus plays an essential role in the underground economy of cyber-crime. Malware authors regularly update their software to defeat defenses or to support new or improved criminal business models. A large body of research has...

    Provided By Vienna University of Economics and Business

  • White Papers // Nov 2012

    Vanity, Cracks and Malware

    Today, a large amount of software products include mechanisms to counter software piracy. However, most protection mechanisms can be easily circumvented by applying soft-ware patches (cracks) or license key generators (keygens) with seemingly no financial incentives. The authors' research shows that the distribution of cracks and keygens not only al-lows...

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2012

    Conflict Visualization for Evolving UML Models

    The urgent demand for supporting teamwork and continuous evolution of software models triggered intensive research on optimistic version control systems for models. State-of-the-art model versioning approaches primarily focus on detecting changes and conflicts between concurrently evolved versions of a model. However, techniques for conflict visualization have been hardly investigated yet....

    Provided By Vienna University of Economics and Business