Vrije Universiteit Amsterdam

Displaying 1-14 of 14 results

  • White Papers // Dec 2013

    Benchmarking the Performance of Microsoft Hyper-V server, VMware ESXi and Xen Hypervisors

    Virtualization is a technology that allows the physical machine resources to be shared among different Virtual Machines (VMs). It is provided by a software layer called hypervisor or Virtual Machine Monitor (VMM). The hypervisor abstracts the hardware from the operating system permitting multiple operating systems to run simultaneously on the...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Jan 2013

    Business Semantics as an Interface Between Enterprise Information Management and the Web of Data: A Case Study in the Flemish Public Administration

    Conceptual modeling captures descriptions of business entities in terms of their attributes and relations with other business entities. When those descriptions are needed for interoperability tasks between two or more autonomously developed information systems ranging from Web of Data with no a priori known purposes for the data to Enterprise...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Jan 2011

    Empirical Analysis for Agent System Comprehension and Verification

    Comprehending and verifying agent system behavior is an arduous task when dealing with complex multi-agent systems whose behaviors are sophisticated. This paper presents an approach resulting from collaboration between the Tracer Tool and the TTL Checker, which together automate the analysis and verification of an implemented system's behavior, with the...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Jan 2011

    Specification of Adaptive Client-Tailored Product Models

    Traditionally, product models often have a rigid nature, both with respect to the manner in which they are initially tailored to clients, and to the way they are maintained over time. Especially when such products are offered at a highly interactive medium such as Internet in the form of web...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Jan 2011

    A Gossip-Based Distributed News Service for Wireless Mesh Networks

    The prospect of having an easily-deployable, self-configuring network for a relatively low investment has made wireless mesh networks an attractive platform to provide wireless services. With the significant attention currently placed on wireless mesh networking, deployment of these mesh networks may be imminent. However, even with the infrastructure in place,...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Nov 2010

    Credit Risk And State Space Methods

    The writing of this paper coincided with the financial crisis of 2007-09. The causes of the crisis were complex and varied, and have by now been analyzed and documented, see e.g. the de Larosiere report (2009) for the European Union, the Geneva Report on the World Economy of Brunnermeier, Crocket,...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Sep 2010

    We Crashed, Now What?

    The authors present an in-depth analysis of the crash-recovery problem and propose a novel approach to recover from otherwise fatal Operating System (OS) crashes. They show how an unconventional, but careful, OS design, aided by automatic compiler-based code instrumentation, offers a practical solution towards the survivability of the entire system....

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Jun 2010

    Live and Trustworthy Forensic Analysis of Commodity Production Systems

    The authors present HyperSleuth, a framework that leverages the virtualization extensions provided by commodity hardware to securely perform live forensic analysis of potentially compromised production systems. HyperSleuth provides a trusted execution environment that guarantees four fundamental properties. First, an attacker controlling the system cannot interfere with the analysis and cannot...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // May 2010

    Paranoid Android: Zero-Day Protection for Smartphones Using the Cloud

    Smartphones have come to resemble PCs in software complexity. Moreover, as they are often used for privacy-sensitive tasks, they are becoming attractive targets for attackers. Unfortunately, they are quite different from PCs in terms of resources, so that PC-oriented security solutions are not always applicable. Worse, common security solutions (such...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Apr 2010

    Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype

    Skype is one of the most used P2P applications on the Internet: VoIP calls, instant messaging, SMS and other features are provided at a low cost to millions of users. Although Skype is a closed source application, an API allows developers to build custom plugins which interact over the Skype...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Dec 2009

    The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack

    Mobile ad hoc networks, due to the unattended nature of the network itself and the dispersed location of nodes, are subject to several unique security issues. One of the most vexed security threat is node capture. A few solutions have already been proposed to address this problem; however, those solutions...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Nov 2009

    Automated Translation and Analysis of a ToolBus Script for Auctions

    ToolBus allows to connect tools via a software bus. Programming is done using the scripting language Tscript, which is based on the process algebra ACP. In previous work, the authors presented a method for analyzing a Tscript by translating it to the process algebraic language mCRL2, and then applying model...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Jul 2009

    CSFS of ERP Implementations in Belgian SMEs: A Multiple Case Study

    The authors perform a literature search for critical success factors in ERP implementations. They classify the success factors in five groups (Vision, scope and goals; Culture, communication and support; Infrastructure; Approach and Project management). They then study successful ERP implementations in four Belgian Small-to-Medium sized Enterprises (SMEs). Through a detailed...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Feb 2009

    A Survey Of Sequential Monte Carlo Methods For Economics And Finance

    This paper serves as an introduction and survey for economists to the field of sequential Monte Carlo methods which are also known as particle filters. Sequential Monte Carlo methods are simulation based algorithms used to compute the high-dimensional and/or complex integrals that arise regularly in applied work. These methods are...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Jan 2011

    Empirical Analysis for Agent System Comprehension and Verification

    Comprehending and verifying agent system behavior is an arduous task when dealing with complex multi-agent systems whose behaviors are sophisticated. This paper presents an approach resulting from collaboration between the Tracer Tool and the TTL Checker, which together automate the analysis and verification of an implemented system's behavior, with the...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Jan 2011

    Specification of Adaptive Client-Tailored Product Models

    Traditionally, product models often have a rigid nature, both with respect to the manner in which they are initially tailored to clients, and to the way they are maintained over time. Especially when such products are offered at a highly interactive medium such as Internet in the form of web...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Dec 2009

    The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack

    Mobile ad hoc networks, due to the unattended nature of the network itself and the dispersed location of nodes, are subject to several unique security issues. One of the most vexed security threat is node capture. A few solutions have already been proposed to address this problem; however, those solutions...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Nov 2010

    Credit Risk And State Space Methods

    The writing of this paper coincided with the financial crisis of 2007-09. The causes of the crisis were complex and varied, and have by now been analyzed and documented, see e.g. the de Larosiere report (2009) for the European Union, the Geneva Report on the World Economy of Brunnermeier, Crocket,...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Feb 2009

    A Survey Of Sequential Monte Carlo Methods For Economics And Finance

    This paper serves as an introduction and survey for economists to the field of sequential Monte Carlo methods which are also known as particle filters. Sequential Monte Carlo methods are simulation based algorithms used to compute the high-dimensional and/or complex integrals that arise regularly in applied work. These methods are...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // May 2010

    Paranoid Android: Zero-Day Protection for Smartphones Using the Cloud

    Smartphones have come to resemble PCs in software complexity. Moreover, as they are often used for privacy-sensitive tasks, they are becoming attractive targets for attackers. Unfortunately, they are quite different from PCs in terms of resources, so that PC-oriented security solutions are not always applicable. Worse, common security solutions (such...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Jan 2011

    A Gossip-Based Distributed News Service for Wireless Mesh Networks

    The prospect of having an easily-deployable, self-configuring network for a relatively low investment has made wireless mesh networks an attractive platform to provide wireless services. With the significant attention currently placed on wireless mesh networking, deployment of these mesh networks may be imminent. However, even with the infrastructure in place,...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Nov 2009

    Automated Translation and Analysis of a ToolBus Script for Auctions

    ToolBus allows to connect tools via a software bus. Programming is done using the scripting language Tscript, which is based on the process algebra ACP. In previous work, the authors presented a method for analyzing a Tscript by translating it to the process algebraic language mCRL2, and then applying model...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Sep 2010

    We Crashed, Now What?

    The authors present an in-depth analysis of the crash-recovery problem and propose a novel approach to recover from otherwise fatal Operating System (OS) crashes. They show how an unconventional, but careful, OS design, aided by automatic compiler-based code instrumentation, offers a practical solution towards the survivability of the entire system....

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Jun 2010

    Live and Trustworthy Forensic Analysis of Commodity Production Systems

    The authors present HyperSleuth, a framework that leverages the virtualization extensions provided by commodity hardware to securely perform live forensic analysis of potentially compromised production systems. HyperSleuth provides a trusted execution environment that guarantees four fundamental properties. First, an attacker controlling the system cannot interfere with the analysis and cannot...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Apr 2010

    Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype

    Skype is one of the most used P2P applications on the Internet: VoIP calls, instant messaging, SMS and other features are provided at a low cost to millions of users. Although Skype is a closed source application, an API allows developers to build custom plugins which interact over the Skype...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Jul 2009

    CSFS of ERP Implementations in Belgian SMEs: A Multiple Case Study

    The authors perform a literature search for critical success factors in ERP implementations. They classify the success factors in five groups (Vision, scope and goals; Culture, communication and support; Infrastructure; Approach and Project management). They then study successful ERP implementations in four Belgian Small-to-Medium sized Enterprises (SMEs). Through a detailed...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Dec 2013

    Benchmarking the Performance of Microsoft Hyper-V server, VMware ESXi and Xen Hypervisors

    Virtualization is a technology that allows the physical machine resources to be shared among different Virtual Machines (VMs). It is provided by a software layer called hypervisor or Virtual Machine Monitor (VMM). The hypervisor abstracts the hardware from the operating system permitting multiple operating systems to run simultaneously on the...

    Provided By Vrije Universiteit Amsterdam

  • White Papers // Jan 2013

    Business Semantics as an Interface Between Enterprise Information Management and the Web of Data: A Case Study in the Flemish Public Administration

    Conceptual modeling captures descriptions of business entities in terms of their attributes and relations with other business entities. When those descriptions are needed for interoperability tasks between two or more autonomously developed information systems ranging from Web of Data with no a priori known purposes for the data to Enterprise...

    Provided By Vrije Universiteit Amsterdam