Change search
Refine search result
1 - 7 of 7
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1. Carlsson, Bengt
    et al.
    Gustavsson, Rune
    Arms Race Within Information Ecosystems2001In: Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349, Vol. 2182, p. 202-207Article in journal (Refereed)
    Abstract [en]

    Interacting agents of exploiters and users within an information ecosystem may be regarded both as biological beings and as part of an economic system of infohabitants. A protection system can be implemented as a filter governing the access to assets. Typically we will have a chain of attacks and countermeasures concerning this access to the desired assets. We model this process as an arms race. We base our model on a process model of a protection system based on exposure time. A user's reaction against an exploiter measure could either be a direct response to the measure or an attempt to anticipate future attacks by more general means of defeating the protection of the exploiter agent. When anticipating future attacks and countermeasures, both users and exploiters will improve their methods and tools due to an arms race. Our arms race model refines the competition as modeled in computational markets to model aspects which typically arise when societies grow beyond what can be controlled in a centralized manner. A dynamic, evolving and robust ecosystem of autonomous agents is sometimes a preferred and possible outcome of the arms race as a hardening process.

    Download full text (pdf)
    FULLTEXT01
  • 2. Fiedler, Markus
    et al.
    Isaksson, Lennart
    Chevul, Stefan
    Measurements and analysis of application-perceived throughput via mobile links2011In: Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349, Vol. 5233, p. 37-69Article in journal (Refereed)
    Abstract [en]

    Application-perceived throughput plays a major role for the performance of networked applications and user experience and thus, for network selection decisions. To support the latter, this tutorial paper investigates the process of user-perceived throughput in GPRS and UMTS systems seen over rather small averaging intervals, based on test traffic mimicking the needs of streaming applications, and analyzes the results with aid of summary statistics. These results reveal a clear influence of the network, seen from variations and autocorrelation of application-perceived throughput mostly on the one-second time scale and indicate that applications have to cope with significant jitter when trying to exploit the nominal throughputs. In GPRS, the promised average throughputs are not reached in downlink direction; instead, significant packet loss occurs. Furthermore, with aid of causality arguments for an equivalent bottleneck, bounds for the extra delay of the first packet sent via mobile links is derived from throughput measurements.

  • 3. Ilie, Dragos
    et al.
    Popescu, Adrian
    Unicast QoS Routing in Overlay Networks2011In: Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349, Vol. 5233, p. 1017-1038Article in journal (Refereed)
    Abstract [en]

    The goal of quality of service (QoS) routing in overlay networks is to address deficiencies in today's Internet Protocol (IP) routing. This is achieved by application-layer protocols executed on end-nodes, which search for Alternate paths that can provide better QoS for the overlay hosts. In the first part of this paper we introduce fundamental concepts of QoS routing and the current state-of-the-art in overlay networks for QoS. In the remaining part of the paper we report performance results for the Overlay Routing Protocol (ORP) framework developed at Blekinge Institute of Technology (BTH) in Karlskrona, Sweden. The results show that QoS paths can be established and maintained as long as one is willing to accept a protocol overhead of maximum 1.5% of the network capacity.

    Download full text (pdf)
    FULLTEXT01
  • 4.
    Mkwawa, Is Haka M
    et al.
    University of Plymouth, UK.
    Kouvatsos, Demetres
    University of Bradford, UK.
    Popescu, Adrian
    Blekinge Institute of Technology, Faculty of Computing.
    Overlay networks and graph theoretic concepts2011In: Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349, Vol. 5233, p. 1039-1054Article in journal (Refereed)
    Abstract [en]

    Overlay networks have shown to be very effective towards the support and enhancement of network performance and the availability of new applications and protocols without interfering with the design of the underlying networks. One of the most challenging open issues in overlay networks, however, is paths overlapping, where overlay paths may share the same physical link and thus, the ability of overlay networks to quickly recover from congestion and path failures is severely affected. This chapter undertakes a review of some graph theoretic based methods for the selection of a set of topologically diverse routers towards the provision of independent paths for better availability, performance and reliability in overlay networks. Moreover, it proposes a graph decomposition-based approach for the maximization of path diversity without degrading network performance of in terms of latency. Some remarks on future developments and challenges in the field of overlay networks are included.

  • 5.
    Popescu, Adrian
    et al.
    Blekinge Institute of Technology, School of Computing.
    Erman, David
    Blekinge Institute of Technology, School of Computing.
    Ilie, Dragos
    Blekinge Institute of Technology, School of Computing.
    Fiedler, Markus
    Blekinge Institute of Technology, School of Computing.
    Popescu, Alexandru
    Blekinge Institute of Technology, School of Computing.
    Vogeleer, Karel De
    Blekinge Institute of Technology, School of Computing.
    Seamless Roaming: Developments and Challenges2011In: Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349, Vol. 5233, p. 795-807Article in journal (Refereed)
    Abstract [en]

    The chapter reports on recent developments and challenges focused on seamless handover. These are subject for the research projects MOBICOME and PERIMETER, recently granted by the EU EUREKA and EU STREP FP7, respectively. The research projects are considering the recently advanced IP Multimedia Subsystem (IMS), which is a Set of technology standards put forth by the Internet Engineering Task Force (IETF) and two Third Generation Partnership Project groups, namely 3GPP and 3GPP2. The foundation of seamless handover is provided by several components, the most important ones being the handover, mobility management, connectivity management and Internet mobility. The paper provides an intensive analysis of these components.

    Download full text (pdf)
    FULLTEXT01
  • 6. Popescu, Adrian
    et al.
    Erman, David
    Vogeleer, Karel De
    Popescu, Alexandru
    Fiedler, Markus
    ROMA: A Middleware Framework for Seamless Handover2011In: Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349, Vol. 5233, p. 784-794Article in journal (Refereed)
    Abstract [en]

    The chapter reports on a new middleware architecture suggested for seamless handover. The middleware is part of an architectural solution suggested by Blekinge Institute of Technology (BTH) for seamless handover, which is implemented at the application layer. This architectures is subject for the PERIMETER STREP and MOBICOME projects, granted by the EU FP7 and EUREKA, respectively. The suggested middleware called ROMA represents a software system with two sets of Application Programmer Interface (API), one for application writers and another one for interfacing various overlay and underlay systems. ROMA thus provides a transport-agnostic platform for future Internet applications. The paper provides a short description of the ROMA middleware, with particular focus on API design and address translation.

    Download full text (pdf)
    FULLTEXT01
  • 7. Popescu, Adrian
    et al.
    Kouvatsos, Demetres
    Remondo, David
    Giordano, Stefano
    Content Distribution over IP: Developments and Challenges2011In: Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349, Vol. 5233, p. 979-987Article in journal (Refereed)
    Abstract [en]

    This chapter focuses on the multimedia distribution over Internet IP under the auspices of the NoE Euro-NGI research project "Routing in Overlay Networks (ROVER)". The multimedia distribution is supported by several components such as services, content distribution chain, protocols and standards whilst Internet is used for content, acquisition, management and delivery as well as an Internet; Protocol Television (IPTV) infrastructure with QoS facilities. As the convergence between fixed and mobile services of wide and local area networks is also expected to take place in the home networking, this puts an extra burden on multimedia distribution, which requires the different, types of wireless access solutions (e.g., WiMAX). In this context, the ROVER, research project adopts the IP Multimedia Subsystem (IMS), which offers a wide range of multimedia services over a single IP infrastructure such as authentication and, for wireless services, roaming capabilities. The research project also considers overlay routing as an alternative solution for content distribution.

    Download full text (pdf)
    FULLTEXT01
1 - 7 of 7
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf