Wichita Collegiate School

Displaying 1-11 of 11 results

  • White Papers // Jan 2013

    On the Energy Efficiency of Cognitive Radios - A Simulation Study of the Ad Hoc Wireless LAN Network

    With the rapid increase in the number of wireless enabled devices, contention for wireless spectrum has never been higher. Cognitive radios have been seen as the way to minimize the congestion by allowing multiplexing between primary users of a piece of spectrum with other opportunistic secondary users of the same...

    Provided By Wichita Collegiate School

  • White Papers // Aug 2012

    On the Energy Efficiency of Ad Hoc Wireless LAN Cognitive Radios Under Dynamic Channel Conditions

    With the rapid increase in the number of wireless enabled devices, contention for wireless spectrum has never been higher. Cognitive radios have been seen as the way to minimize the congestion by allowing multiplexing between primary users of a piece of spectrum with other opportunistic secondary users of the same...

    Provided By Wichita Collegiate School

  • White Papers // Aug 2011

    Integrating Scheduling and Replication in Data Grids With Performance Guarantee

    Data Grid consists of geographically distributed computing and storage resources that are used in large scale scientific applications. Job scheduling and data replication are two well-known techniques to boost the performance of Data Grid. There has been extensive research on integrating both techniques to further improve performance in Data Grid....

    Provided By Wichita Collegiate School

  • White Papers // May 2011

    An Accurate System-Wide Anonymity Metric for Probabilistic Attacks

    The authors give a critical analysis of the system-wide anonymity metric of Edman et al. which is based on the permanent value of a doubly-stochastic matrix. By providing an intuitive understanding of the permanent of such a matrix, they show that a metric that looks no further than this composite...

    Provided By Wichita Collegiate School

  • White Papers // May 2011

    Multi-Sensor Activation for Temporally Correlated Event Monitoring with Renewable Energy Sources

    Future sensor networks would comprise sensing devices with energy-harvesting capabilities from renewable energy sources, such as solar power. This paper focuses on design of efficient algorithms for multi-sensor activation to optimise overall event detection probability in presence of uncertainties in event and recharge processes. The authors formulate the dynamic multi-sensor...

    Provided By Wichita Collegiate School

  • White Papers // May 2011

    An Extensive Study of Slotted Aloha-Based RFID Anti-Collision Protocols

    Radio Frequency IDentification (RFID) is used to identify, track, and manage tagged animate or inanimate objects automatically using wireless communication technology. A serious concern faced by RFID technology is the collisions that occur among tag responses when queried by a reader that limits system performance significantly. Collisions bring extra delay,...

    Provided By Wichita Collegiate School

  • White Papers // Nov 2010

    Data Caching for Enhancing Anonymity

    The benefits of caching for reducing access time to frequently needed data, in order to improve system performance, are already well-known. In this paper, a proposal for employing data caching for increasing the level of anonymity provided by an anonymity system is presented. This technique is especially effective for user...

    Provided By Wichita Collegiate School

  • White Papers // Sep 2010

    On the Sender Cover Traffic Countermeasure Against an Improved Statistical Disclosure Attack

    The statistical disclosure attack against a particular user of an anonymity system is known to be very effective in determining, after long-term observation of the system, the set of receivers that user sends messages to. This paper first presents an improvement over this attack that, by employing a weighted mean...

    Provided By Wichita Collegiate School

  • White Papers // Apr 2009

    Multi-Sensor Event Detection Under Temporal Correlations with Renewable Energy Sources

    Sensor networks have major applications in environmental monitoring, relief operations, surveillance, health-care and defense. Future sensor networks would comprise of sensing devices with energy harvesting capabilities from renewable energy sources such as solar power. Multiple sensor nodes deployed in the region of interest would collaborate to achieve a global objective,...

    Provided By Wichita Collegiate School

  • White Papers // Jun 2006

    An Enterprise Model of Interoperability

    Enterprise Integration (EI) is the re-engineering of business processes and information systems to improve teamwork and coordination across organizational boundaries, thereby increasing the effectiveness of the enterprise as a whole. EI is enabled by interoperating enterprise models. This paper presents an IDEF0 model specifying an approach for interoperating dissimilar enterprise...

    Provided By Wichita Collegiate School

  • White Papers // Jan 2006

    The Missing Link: Culture and Language Barriers to Interoperability

    Interoperability is key to ensuring that a global supply chain operates as seamlessly as a vertically integrated organization. Much research has been accomplished and is on-going related to the technical, organisational and scientific issues concerning interoperating dissimilar enterprise systems and languages. However, there are significant issues concerning interoperating information across...

    Provided By Wichita Collegiate School

  • White Papers // Aug 2011

    Integrating Scheduling and Replication in Data Grids With Performance Guarantee

    Data Grid consists of geographically distributed computing and storage resources that are used in large scale scientific applications. Job scheduling and data replication are two well-known techniques to boost the performance of Data Grid. There has been extensive research on integrating both techniques to further improve performance in Data Grid....

    Provided By Wichita Collegiate School

  • White Papers // May 2011

    An Accurate System-Wide Anonymity Metric for Probabilistic Attacks

    The authors give a critical analysis of the system-wide anonymity metric of Edman et al. which is based on the permanent value of a doubly-stochastic matrix. By providing an intuitive understanding of the permanent of such a matrix, they show that a metric that looks no further than this composite...

    Provided By Wichita Collegiate School

  • White Papers // Nov 2010

    Data Caching for Enhancing Anonymity

    The benefits of caching for reducing access time to frequently needed data, in order to improve system performance, are already well-known. In this paper, a proposal for employing data caching for increasing the level of anonymity provided by an anonymity system is presented. This technique is especially effective for user...

    Provided By Wichita Collegiate School

  • White Papers // Sep 2010

    On the Sender Cover Traffic Countermeasure Against an Improved Statistical Disclosure Attack

    The statistical disclosure attack against a particular user of an anonymity system is known to be very effective in determining, after long-term observation of the system, the set of receivers that user sends messages to. This paper first presents an improvement over this attack that, by employing a weighted mean...

    Provided By Wichita Collegiate School

  • White Papers // May 2011

    Multi-Sensor Activation for Temporally Correlated Event Monitoring with Renewable Energy Sources

    Future sensor networks would comprise sensing devices with energy-harvesting capabilities from renewable energy sources, such as solar power. This paper focuses on design of efficient algorithms for multi-sensor activation to optimise overall event detection probability in presence of uncertainties in event and recharge processes. The authors formulate the dynamic multi-sensor...

    Provided By Wichita Collegiate School

  • White Papers // Apr 2009

    Multi-Sensor Event Detection Under Temporal Correlations with Renewable Energy Sources

    Sensor networks have major applications in environmental monitoring, relief operations, surveillance, health-care and defense. Future sensor networks would comprise of sensing devices with energy harvesting capabilities from renewable energy sources such as solar power. Multiple sensor nodes deployed in the region of interest would collaborate to achieve a global objective,...

    Provided By Wichita Collegiate School

  • White Papers // Jan 2013

    On the Energy Efficiency of Cognitive Radios - A Simulation Study of the Ad Hoc Wireless LAN Network

    With the rapid increase in the number of wireless enabled devices, contention for wireless spectrum has never been higher. Cognitive radios have been seen as the way to minimize the congestion by allowing multiplexing between primary users of a piece of spectrum with other opportunistic secondary users of the same...

    Provided By Wichita Collegiate School

  • White Papers // Jan 2006

    The Missing Link: Culture and Language Barriers to Interoperability

    Interoperability is key to ensuring that a global supply chain operates as seamlessly as a vertically integrated organization. Much research has been accomplished and is on-going related to the technical, organisational and scientific issues concerning interoperating dissimilar enterprise systems and languages. However, there are significant issues concerning interoperating information across...

    Provided By Wichita Collegiate School

  • White Papers // Jun 2006

    An Enterprise Model of Interoperability

    Enterprise Integration (EI) is the re-engineering of business processes and information systems to improve teamwork and coordination across organizational boundaries, thereby increasing the effectiveness of the enterprise as a whole. EI is enabled by interoperating enterprise models. This paper presents an IDEF0 model specifying an approach for interoperating dissimilar enterprise...

    Provided By Wichita Collegiate School

  • White Papers // May 2011

    An Extensive Study of Slotted Aloha-Based RFID Anti-Collision Protocols

    Radio Frequency IDentification (RFID) is used to identify, track, and manage tagged animate or inanimate objects automatically using wireless communication technology. A serious concern faced by RFID technology is the collisions that occur among tag responses when queried by a reader that limits system performance significantly. Collisions bring extra delay,...

    Provided By Wichita Collegiate School

  • White Papers // Aug 2012

    On the Energy Efficiency of Ad Hoc Wireless LAN Cognitive Radios Under Dynamic Channel Conditions

    With the rapid increase in the number of wireless enabled devices, contention for wireless spectrum has never been higher. Cognitive radios have been seen as the way to minimize the congestion by allowing multiplexing between primary users of a piece of spectrum with other opportunistic secondary users of the same...

    Provided By Wichita Collegiate School