WSDOT

Displaying 1-40 of 302 results

  • White Papers // Jun 2011

    Enterprise Resource Planning (ERP) and Product Selection in Small and Medium Enterprise (SME) Organizations

    In this paper, the authors explore aspects of project management and product specifications ERP selection process in small and medium versus large organizations. In today's business environment of competition between firms and the complexity of the network market is growing at a rapid pace. Therefore making efficient use of resources,...

    Provided By WSDOT

  • White Papers // Mar 2012

    On the Integration of Knowledge Management, Cloud Computing and LOHAS Economy as a Corporate Strategy

    In this paper, the authors discuss the triangular strategy of integrating knowledge management, cloud computing and Lifestyle Of Health And Sustainability (LOHAS) as a corporate strategy. The core of this strategy is that consumer behavior is the consequence of culture influence. In order to increase the impact of Cheer &...

    Provided By WSDOT

  • White Papers // Jul 2009

    Grid and Cloud Computing Integration with NGN

    Over the past few years, Grid computing has become an increasingly hot topic in the world of new technologies. It is gradually also becoming familiar to the mass public through scientific and industrial field trials. Grid computing has been adopted and is used by academia and industry due to its...

    Provided By WSDOT

  • White Papers // Dec 2012

    Comparison of Multiple IaaS Cloud Platform Solutions

    Currently, several solution cloud computing IaaS (Infrastructure as a Service) exists. Administrators, developers and users need to choose the best environment for them. The availability of free open source Cloud platforms is essential to further drive the proliferation of private and hybrid Cloud computing environments. In this paper, the authors...

    Provided By WSDOT

  • White Papers // Jun 2013

    Client-Independence as the Critical Step Towards a New Level of Cloud Computing

    It is nowadays impossible to examine the modern world without picturing it as an information society. Among the most promising directions in current applicative computer science is the development of cloud computing, as a novel way of computer usage. As a natural progress of time-share systems from the 1960s to...

    Provided By WSDOT

  • White Papers // Jun 2013

    A Technique of Formal Security Modeling in Autonomic Cloud Computing Environment

    As clouds are complex, large-scale, and heterogeneous distributed systems management of their resources is a challenging task. It requires co-optimization at multiple layers (infrastructure, platform, and application) exhibiting autonomic properties. Autonomic systems exhibit the ability of self-monitoring, self-repairing, and self-optimizing by constantly sensing them and tuning their performance. The notions...

    Provided By WSDOT

  • White Papers // Mar 2013

    Utility Based Load Balancing with Grid Computing Approach

    Grid Computing is a high performance computing environment that allows sharing of geographically distributed resources across multiple administrative domains and used to solve large scale computational demands. In the grid environment, users can access the resources transparently without knowing where they are physically located. The commonly used load balancing policies...

    Provided By WSDOT

  • White Papers // Sep 2011

    What Does It Service Management Look Like in the Cloud?

    In recent years a new approach for the dynamic usage of computational power, memory and other resources comes into play: the Cloud Computing paradigm. This new approach needs to be concerned with respect to IT Service Management since cloud based infrastructures have to be managed differently from a usual infrastructure....

    Provided By WSDOT

  • White Papers // Oct 2012

    Performance Testing of Cloud Storage While Using Spatial Data

    Cloud computing changes the way users access the ICT systems, which means resources (computers, infrastructures, data storage and applications) and the way of managing and delivering computing technologies, services and solutions. This paper deals with the meaning of the cloud computing technologies in nowadays GIS and their role in the...

    Provided By WSDOT

  • White Papers // Apr 2011

    Cyber Security in a Cloud With Insight on the Slovenian Situation

    As current trends show, more and more enterprises, public administrations and home users are using cloudbased infrastructure. Thus, new challenges arise, with many questions. How is it possible to perform forensics in a new environment without having physical access to a system? Is it enough to involve local authorities where...

    Provided By WSDOT

  • White Papers // Jan 2011

    Performance Evaluation of Distributed Database on PC Cluster Computers

    Presently, Information is very importance aspect to be recognized on every application. Modern organizations have stored and managed their information using database management system. The proprietary DBMSs Software is very expensive license to spend depending on the scale of capability to handle their transactions. Therefore this research would like to...

    Provided By WSDOT

  • White Papers // Oct 2010

    Specific Modeling of the Business Processes

    The paper describes a specific problem - the process of damage claim processing in insurance companies that is reported for earlier underwritten risk. During the analysis of this problem the model has been created that can be used in similar cases for the transfer of knowledge and facts from the...

    Provided By WSDOT

  • White Papers // Sep 2010

    Data Wiping System With Fully Automated, Hidden and Remote Destruction Capabilities

    In this paper, the authors will describe a method to securely erase sensitive data in fully automated and hidden mode and with remote data destruction capabilities. Compared to other similar technologies, their method has two main advantages. The first one is the ability to run in a fully automated mode,...

    Provided By WSDOT

  • White Papers // Aug 2010

    A Potable Biometric Access Device Using Dedicated Fingerprint Processor

    Biometric signatures, or biometrics, are used to identify individuals by measuring certain unique physical and behavioral characteristics. Individuals must be identified to allow or prohibit access to secure areas - or to enable them to use personal digital devices such as, computer, Personal Digital Assistant (PDA), or mobile phone. Virtually...

    Provided By WSDOT

  • White Papers // Feb 2010

    Data Mining Based on Rough Sets in Risk Decision-making: Foundation and Application

    In order to solve the problem of the redundant information to distinguish in the risk decision-making, in this paper, the data mining algorithms based on Rough Sets is studied. And the authors know the risk decision-making is an important aspect in the management practice. In the risk decision process of...

    Provided By WSDOT

  • White Papers // Feb 2008

    Using System Dynamics for Managing Risks in Information Systems

    Each and every security oriented activity in information systems has to start with the basics, which is risk management. Although risk management is a well established and known discipline in many other areas, its direct translation to information systems is not an easy and straightforward because of specifics of contemporary...

    Provided By WSDOT

  • White Papers // Sep 2009

    The Factors Influencing Individual's Behavior on Privacy Protection

    Individual's behavior on privacy protecting is affected by not only the personal psychological factors, but also the external influences. However, the latter was always ignored in previous researches. For investigating how the external as well as internal factors simultaneously affected one's privacy concern on privacy protection and restrained related behavior,...

    Provided By WSDOT

  • White Papers // Nov 2009

    Improved Mining of Software Complexity Data on Evolutionary Filtered Training Sets

    With the evolution of information technology and software systems, software reliability has become one of the most important topics of software engineering. As the dependency of society on software systems increase, so increases also the importance of efficient software fault prediction. In this paper the authors present a new approach...

    Provided By WSDOT

  • White Papers // Sep 2009

    Considering Application Domain Ontologies for Data Mining

    The dramatically explosion of data and the growing number of different data sources are exposing researchers to a new challenge - how to acquire, maintain and share knowledge from large databases in the context of rapidly applied and evolving research. This paper describes a research of an ontological approach for...

    Provided By WSDOT

  • White Papers // Sep 2009

    Nonce-Aware Encryption

    Two different goals for encryptions have been considered: INDistinguishability (IND) and Non-Malleability (NM). IND requires that it be infeasible for an adversary to distinguish between the ciphertexts of any two messages, even if the two original messages are given. NM requires that an adversary given a challenge ciphertext be unable...

    Provided By WSDOT

  • White Papers // Apr 2009

    Supporting Architectural Design Decisions Through Risk Identification Architecture Pattern (RIAP) Model

    Web projects tend to have a high possibility of loss or failure compared to traditional projects. For this reason, risk management is becoming more emphasized and systemized in Web projects so as to improve the quality of difficult decisions that normally encompass a higher level of risk exposures. Software architecture...

    Provided By WSDOT

  • White Papers // Apr 2009

    A Novel Approach ForMissing Data Processing Based on Compounded PSO Clustering

    Incomplete and noisy data significantly distort data mining results. Therefore, taking care of missing values or noisy data becomes extremely crucial in data mining. Recent researches start to exploit data clustering techniques to estimate missing values. Obviously the quality of clustering analysis significantly influences the performance of missing data estimation....

    Provided By WSDOT

  • White Papers // May 2009

    Database Analysis Models Used for Studying the Residential Assemble Market

    Optimism or pessimism, certainty or uncertainty, price evolution all these are key words concerning the residential assemblies market of Romania. The authors find data about the residential rating and about the parameters of project evaluation. Some basic rules and snares in real estate transactions are presented. In this paper, they...

    Provided By WSDOT

  • White Papers // May 2009

    On the Parallelism of I/O Scheduling Algorithms in MEMS-Based Large Storage Systems

    MEMS-based storage is being developed as a new storage media that has several salient characteristics such as high-parallelism, high density, and low-power consumption. Because physical structures of MEMS-based storage is different from those of hard disks, new software management techniques for MEMS-based storage are needed. Specifically, MEMS-based storage has thousands...

    Provided By WSDOT

  • White Papers // Feb 2009

    A Study on the Applications of Data Mining Techniques to Enhance Customer Lifetime Value

    In today's competitive environment, a successful company must provide better customized services, that are not only acceptable to customers but satisfy their needs as well, in order to survive and succeed in gaining an advantage against competition. It has been proven by many studies that it is more costly to...

    Provided By WSDOT

  • White Papers // Feb 2009

    Data Collection System Design in SSM Networks With Unicast Feedback - Server Message Definition

    The system for mass data collection with cumulative acknowledge is described in this paper. A server message for cumulative acknowledgement is specified. The system is development for single source multicast networks. These networks are characterized by the ability to communicate with concrete network nodes. The groups of nodes are possible...

    Provided By WSDOT

  • White Papers // Apr 2009

    A Framework and Implementation of Information Content Reasoning in a Database

    Databases' capability is limited in terms of inference. Especially, when users explore information beyond the scope of data within databases, the databases normally cannot provide the information. The underlying reason of the problem is that queries are answered based on a direct match between a query and data (up to...

    Provided By WSDOT

  • White Papers // Mar 2009

    Personal Information Privacy Protection in E-Commerce

    Today, the world are moving towards e-commerce application in completing their daily jobs. An ecommerce application becomes the preferred medium to complete the day's tasks. Electronic commerce or ecommerce is a potentially growing business for today's market. Basically, online shopping eliminates conventional purchase approach which is labor-intensive and time-consuming. Through...

    Provided By WSDOT

  • White Papers // Nov 2010

    A New System Architecture for Flexible Database Conversion

    Much research has been undertaken to work on database sharing, integration, conversion, merging and migration. In particular, database conversion has attracted researchers' attention due to the rapid change in the computer technology. There are also several tools available on the Web for free usage on handling database conversion. All of...

    Provided By WSDOT

  • White Papers // Sep 2010

    Research on A-Key Distribution Algorithms for Protecting Data of RS-485-Based Industrial Infrastructure

    The RS-485 protocol is a Modbus serial communication, mainly used by SCADA(Supervisory Control And Data Acquisition). Most industrial infrastructure using this communication protocol is designed not to be exposed to an open network environment, seriously vulnerable to security threats. Therefore, this study examines key management architecture in order to suggest...

    Provided By WSDOT

  • White Papers // Feb 2009

    Usability and Performance of Secure Mobile Messaging: M-PKI

    Human life style change substantially when the cellular technology goes commercial. Short Messaging Service (SMS) and Multimedia Message Service (MMS) play important roles in the people daily life. The recent report carried out by Mobile Data Association (MDA) shows that the yearly growth of SMS and MMS achieves 30 percent...

    Provided By WSDOT

  • White Papers // Apr 2009

    Schedule Risk Management for Business M-Applications Development Projects

    The grand majority of software development projects are known to be late and over the budget. Several surveys performed during the last 15 years expose a relatively poor performance in delivering successful software projects. Most of the projects hit schedule and budget overruns of 25% to 100% and sometimes even...

    Provided By WSDOT

  • White Papers // Jun 2010

    A New Accurate Technique for Iris Boundary Detection

    The Iris based identification systems have been noticed exceedingly, presently. In this process, the iris should be segmented from captured eye image. The low contrast between pupil and iris, usually, will harden the segmenting process and will decrease the accuracy of detecting boundary between them. In order to segment the...

    Provided By WSDOT

  • White Papers // Apr 2010

    Rethinking Database Updates using a Multiple Assignment-based Approach

    The authors investigate the problems involved in efficient implementation of multiple assignment to database tables, as suggested by Date and Darwen in their Third Manifesto proposal for future database systems. They explain the connection between assignment and the insert, delete and update operations and why multiple assignments executed simultaneously are...

    Provided By WSDOT

  • White Papers // Feb 2009

    Analysis of System Bus Transaction Vulnerability Based on FMEA Methodology in SystemC TLM Design Platform

    Intelligent safety-critical systems, such as intelligent automotive systems or intelligent robots, require a stringent reliability while the systems are in operation. As System-on-Chip (SoC) becomes prevalent in the intelligent system applications, the reliability issue of SoC is getting more attention in the design industry while the SoC fabrication enters the...

    Provided By WSDOT

  • White Papers // Feb 2009

    Identifying Crosscutting Concerns Using Partitional Clustering

    Aspect mining is a research direction that tries to identify crosscutting concerns in already developed software systems, without using aspect oriented programming. The goal is to identify them and then to refactor them to aspects, to achieve a system that can be easily understood, maintained and modified. In this paper,...

    Provided By WSDOT

  • White Papers // Feb 2009

    Activate the Dynamic Delegation Process in X.509 Certification via a New Extension

    The increasing number of clients and users of e-banking, e-government and e-application through digital communications, made it a must to develop new methods and solutions for authentications and secure access. Digital certificates are one of these methods for secure transactions, X.509 certificate is one standard for these digital certificates, Despite...

    Provided By WSDOT

  • White Papers // Feb 2009

    UML4ODP: OCL 2.0 Constraints Specification & UML Modeling of Interfaces in the Computational Metamodel

    This paper is to analysis of computational language concepts and introduction of novel pertinent ones in order to provide a new computational meta-model of interaction signatures in UML4ODP FDIS. The authors mainly introduce the concept of Functional computational interface which unify signal and operation interfaces notions. The unification of signal...

    Provided By WSDOT

  • White Papers // Feb 2009

    Mitigation of the Effects of Selfish and Malicious Nodes in Ad-hoc Networks

    A wireless Ad-hoc network is a group of wireless devices that communicate with each other without utilizing any central management infrastructure. The operation of Ad-hoc networks depends on the cooperation among nodes to provide connectivity and communication routes. However, such an ideal situation may not always be achievable in practice....

    Provided By WSDOT

  • White Papers // Nov 2008

    Real-Time Face Detection using Dynamic Background Subtraction

    Face biometrics is an automated method of recognizing a person's face based on a physiological or behavioral characteristic. Face recognition works by first obtaining an image of a person. This process is usually known as face detection. In this paper, the authors describe an approach for face detection that is...

    Provided By WSDOT