Warsaw University

Displaying 1-18 of 18 results

  • White Papers // Feb 2014

    Improving Hard Disk Contention-Based Covert Channel in Cloud Computing Environment

    Steganographic methods allow the covert exchange of secret data between parties aware of the procedure. The cloud computing environment is a new and hot target for steganographers, and currently not many solutions have been proposed. This paper proposes CloudSteg which is a steganographic method that allows the creation of a...

    Provided By Warsaw University

  • White Papers // Jul 2013

    Transformational Implementation of Business Processes in SOA

    The paper develops a method for transformational implementation and optimization of business processes in a service oriented architecture. The method promotes separation of concerns and allows making business decisions by business people and technical decisions by technical people. To achieve this goal, a description of a business process designed by...

    Provided By Warsaw University

  • White Papers // Nov 2012

    Implementation of Business Processes in Service Oriented Architecture

    The paper develops a method for transformational implementation of business processes in service oriented architecture. The method promotes separation of concerns and allows making business decisions by business people and technical decisions by technical people. To achieve this goal, a description of a business process designed by business people is...

    Provided By Warsaw University

  • White Papers // Oct 2012

    Efficient Transmission of Measurement Data from FPGA to Embedded System Via Ethernet Link

    This paper presents a system consisting of the FPGA IP core, the simple network protocol and the Linux device driver, capable of efficient and reliable data transmission from a low resources FPGA chip to the Linux-based embedded computer system, via a private Ethernet network (consisting of a single segment or...

    Provided By Warsaw University

  • White Papers // Aug 2012

    Optimization of Business Processes in Service Oriented Architecture

    This paper describes a method for the implementation and optimization of business processes in a Service Oriented Architecture (SOA). A process specification is created by business people, and expressed in Business Process Modeling Notation (BPMN). The specification is then translated into Business Process Execution Language (BPEL), and used by technical...

    Provided By Warsaw University

  • White Papers // Dec 2011

    Traffic Re-Optimization Strategies for Dynamically Provisioned WDM Networks

    In Wavelength Division Multiplexed (WDM) networks with dynamic lightpath provisioning, connection requests are served without any prior knowledge of their arrival and departure times. As time passes, network resources may become fragmented because of the network dynamism. Under these circumstances it is highly beneficial to re-optimize (i.e., de-fragment) the existing...

    Provided By Warsaw University

  • White Papers // Sep 2011

    Business Process Design in Service Oriented Architecture

    This paper describes a method for transformational design and implementation of business processes in Service Oriented Architecture (SOA). The starting point of the method is an initial process specification expressed in Business Process Execution Language (BPEL). The design phase consists of a series of transformations, which change the internal process...

    Provided By Warsaw University

  • White Papers // Sep 2011

    Compact Node-Link Formulations for the Optimal Single Path MPLS Fast Reroute Layout

    This paper discusses compact node-link formulations for MPLS fast reroute optimal single path layout. The authors propose mathematical formulations for MPLS fast reroute local protection mechanisms. In fact, they compare one-to-one (also called detour) local protection and many-to-one (also called facility backup) local protection mechanisms with respect to minimized maximum...

    Provided By Warsaw University

  • White Papers // Sep 2011

    Agent Based VoIP Application With Reputation Mechanisms

    In this paper, the authors introduce their new VoIP model the aim of which is to meet the challenges of modern telephony. They present project concepts, details of implementation and their testing environment which was designed for testing many aspects of VoIP based systems. Their system combines mechanisms for ensuring...

    Provided By Warsaw University

  • White Papers // Mar 2011

    Logical Foundations and Complexity of 4QL, a Query Language With Unrestricted Negation

    The paper discusses properties of a DATALOG-like query language 4QL, originally outlined by Ma?uszy?nski and Sza?as [MS11]. 4QL allows one to use rules with negation in heads and bodies of rules. It is based on a simple and intuitive semantics and provides uniform tools for "lightweight" versions of known forms...

    Provided By Warsaw University

  • White Papers // Jan 2011

    Herfindahl-Hirschman Meets International Trade And Development Theories

    To date there does not exist a generally acceptable measure or index of Specialization in International Trade. Development Economic Theory embraces the expectation of a direct relationship between economic growth and export diversification. However, International Trade Theory supports the association of export expansion with increased specialization. The paper proposes a...

    Provided By Warsaw University

  • White Papers // Nov 2009

    Connection-Oriented Service Management in Provider Alliances: A Shapley Value Perspective

    In the context of cross-provider network service provisioning, the "Provider Alliance" concept has recently arisen as a necessary collaboration framework among providers willing to offer cross-provider connection-oriented services. A possible provider alliance management solution for inter-AS Multi-Protocol Label Switching (MPLS) relies on the definition of a "Service level" above a...

    Provided By Warsaw University

  • White Papers // Oct 2009

    Optimization of Object-Oriented Queries Addressing Large and Small Collections

    When a query jointly addresses very large and very small collections it may happen that an iteration caused by a query operator is driven by a large collection and in each cycle it evaluates a subquery that depends on an element of a small collection. For each such element the...

    Provided By Warsaw University

  • White Papers // Jun 2009

    A Performance Analysis of HICCUPS - A Steganographic System for WLAN

    The HICCUPS (HIdden Communication system for CorrUPted networkS), introduced by the author in, is a steganographic system for WLANs (Wireless Local Area Networks). The main innovation of the system is usage of frames with intentionally wrong checksums to establish covert communication. The HICCUPS was recognized as the first steganographic system...

    Provided By Warsaw University

  • White Papers // Jun 2009

    Integrated Method for Detection of Unknown Steganographic Content

    The proposed system is restrained to the content of the knowledge base. It is important to notice that the system should work as kind of antiviral software. To make it usable one should be monitoring continuously the Internet and the steganographic software. In the age of information and international terrorism...

    Provided By Warsaw University

  • White Papers // May 2009

    Debellor: Open Source Modular Platform for Scalable Data Mining

    This paper introduces Debellor (www.debellor.org) - an open source extensible data mining platform with stream-oriented architecture, where all data transfers between elementary algorithms take the form of a stream of samples. Data streaming enables implementation of scalable algorithms, which can efficiently process large volumes of data, exceeding available memory. This...

    Provided By Warsaw University

  • White Papers // May 2009

    Hiding Information in Retransmissions

    The paper presents a new steganographic method called RSTEG (Retransmission Steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms. The main innovation of RSTEG is to not acknowledge a successfully received packet in order to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead...

    Provided By Warsaw University

  • White Papers // Mar 2007

    AMI-SME: An Exploratory Approach to Knowledge Retrieval for SME's

    Increasing competition and globalisation trends are challenging companies to expand the target markets for their products and services into foreign countries. The process of internationalisation necessitates many decisions. Adequate information about the specific industry niche is required to support decision making and ensure the successful implementation of the internationalisation strategy....

    Provided By Warsaw University

  • White Papers // May 2009

    Debellor: Open Source Modular Platform for Scalable Data Mining

    This paper introduces Debellor (www.debellor.org) - an open source extensible data mining platform with stream-oriented architecture, where all data transfers between elementary algorithms take the form of a stream of samples. Data streaming enables implementation of scalable algorithms, which can efficiently process large volumes of data, exceeding available memory. This...

    Provided By Warsaw University

  • White Papers // Mar 2011

    Logical Foundations and Complexity of 4QL, a Query Language With Unrestricted Negation

    The paper discusses properties of a DATALOG-like query language 4QL, originally outlined by Ma?uszy?nski and Sza?as [MS11]. 4QL allows one to use rules with negation in heads and bodies of rules. It is based on a simple and intuitive semantics and provides uniform tools for "lightweight" versions of known forms...

    Provided By Warsaw University

  • White Papers // May 2009

    Hiding Information in Retransmissions

    The paper presents a new steganographic method called RSTEG (Retransmission Steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms. The main innovation of RSTEG is to not acknowledge a successfully received packet in order to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead...

    Provided By Warsaw University

  • White Papers // Jun 2009

    A Performance Analysis of HICCUPS - A Steganographic System for WLAN

    The HICCUPS (HIdden Communication system for CorrUPted networkS), introduced by the author in, is a steganographic system for WLANs (Wireless Local Area Networks). The main innovation of the system is usage of frames with intentionally wrong checksums to establish covert communication. The HICCUPS was recognized as the first steganographic system...

    Provided By Warsaw University

  • White Papers // Jun 2009

    Integrated Method for Detection of Unknown Steganographic Content

    The proposed system is restrained to the content of the knowledge base. It is important to notice that the system should work as kind of antiviral software. To make it usable one should be monitoring continuously the Internet and the steganographic software. In the age of information and international terrorism...

    Provided By Warsaw University

  • White Papers // Jan 2011

    Herfindahl-Hirschman Meets International Trade And Development Theories

    To date there does not exist a generally acceptable measure or index of Specialization in International Trade. Development Economic Theory embraces the expectation of a direct relationship between economic growth and export diversification. However, International Trade Theory supports the association of export expansion with increased specialization. The paper proposes a...

    Provided By Warsaw University

  • White Papers // Dec 2011

    Traffic Re-Optimization Strategies for Dynamically Provisioned WDM Networks

    In Wavelength Division Multiplexed (WDM) networks with dynamic lightpath provisioning, connection requests are served without any prior knowledge of their arrival and departure times. As time passes, network resources may become fragmented because of the network dynamism. Under these circumstances it is highly beneficial to re-optimize (i.e., de-fragment) the existing...

    Provided By Warsaw University

  • White Papers // Oct 2009

    Optimization of Object-Oriented Queries Addressing Large and Small Collections

    When a query jointly addresses very large and very small collections it may happen that an iteration caused by a query operator is driven by a large collection and in each cycle it evaluates a subquery that depends on an element of a small collection. For each such element the...

    Provided By Warsaw University

  • White Papers // Oct 2012

    Efficient Transmission of Measurement Data from FPGA to Embedded System Via Ethernet Link

    This paper presents a system consisting of the FPGA IP core, the simple network protocol and the Linux device driver, capable of efficient and reliable data transmission from a low resources FPGA chip to the Linux-based embedded computer system, via a private Ethernet network (consisting of a single segment or...

    Provided By Warsaw University

  • White Papers // Sep 2011

    Compact Node-Link Formulations for the Optimal Single Path MPLS Fast Reroute Layout

    This paper discusses compact node-link formulations for MPLS fast reroute optimal single path layout. The authors propose mathematical formulations for MPLS fast reroute local protection mechanisms. In fact, they compare one-to-one (also called detour) local protection and many-to-one (also called facility backup) local protection mechanisms with respect to minimized maximum...

    Provided By Warsaw University

  • White Papers // Sep 2011

    Agent Based VoIP Application With Reputation Mechanisms

    In this paper, the authors introduce their new VoIP model the aim of which is to meet the challenges of modern telephony. They present project concepts, details of implementation and their testing environment which was designed for testing many aspects of VoIP based systems. Their system combines mechanisms for ensuring...

    Provided By Warsaw University

  • White Papers // Nov 2009

    Connection-Oriented Service Management in Provider Alliances: A Shapley Value Perspective

    In the context of cross-provider network service provisioning, the "Provider Alliance" concept has recently arisen as a necessary collaboration framework among providers willing to offer cross-provider connection-oriented services. A possible provider alliance management solution for inter-AS Multi-Protocol Label Switching (MPLS) relies on the definition of a "Service level" above a...

    Provided By Warsaw University

  • White Papers // Mar 2007

    AMI-SME: An Exploratory Approach to Knowledge Retrieval for SME's

    Increasing competition and globalisation trends are challenging companies to expand the target markets for their products and services into foreign countries. The process of internationalisation necessitates many decisions. Adequate information about the specific industry niche is required to support decision making and ensure the successful implementation of the internationalisation strategy....

    Provided By Warsaw University

  • White Papers // Nov 2012

    Implementation of Business Processes in Service Oriented Architecture

    The paper develops a method for transformational implementation of business processes in service oriented architecture. The method promotes separation of concerns and allows making business decisions by business people and technical decisions by technical people. To achieve this goal, a description of a business process designed by business people is...

    Provided By Warsaw University

  • White Papers // Jul 2013

    Transformational Implementation of Business Processes in SOA

    The paper develops a method for transformational implementation and optimization of business processes in a service oriented architecture. The method promotes separation of concerns and allows making business decisions by business people and technical decisions by technical people. To achieve this goal, a description of a business process designed by...

    Provided By Warsaw University

  • White Papers // Sep 2011

    Business Process Design in Service Oriented Architecture

    This paper describes a method for transformational design and implementation of business processes in Service Oriented Architecture (SOA). The starting point of the method is an initial process specification expressed in Business Process Execution Language (BPEL). The design phase consists of a series of transformations, which change the internal process...

    Provided By Warsaw University

  • White Papers // Aug 2012

    Optimization of Business Processes in Service Oriented Architecture

    This paper describes a method for the implementation and optimization of business processes in a Service Oriented Architecture (SOA). A process specification is created by business people, and expressed in Business Process Modeling Notation (BPMN). The specification is then translated into Business Process Execution Language (BPEL), and used by technical...

    Provided By Warsaw University

  • White Papers // Feb 2014

    Improving Hard Disk Contention-Based Covert Channel in Cloud Computing Environment

    Steganographic methods allow the covert exchange of secret data between parties aware of the procedure. The cloud computing environment is a new and hot target for steganographers, and currently not many solutions have been proposed. This paper proposes CloudSteg which is a steganographic method that allows the creation of a...

    Provided By Warsaw University