Search For:

Displaying 1-50 out of 124 total
Scrutinizing the State of Cloud Storage with Cloud-RAID: A Secure and Reliable Storage Above the Clouds
Found in: 2013 IEEE 6th International Conference on Cloud Computing (CLOUD)
By Maxim Schnjakin,Christoph Meinel
Issue Date:June 2013
pp. 309-318
Public cloud storage services enable organizations to manage data with low operational expenses. However, the benefits come along with challenges and open issues such as security, reliability and the risk to become dependent on a provider for its service. ...
 
German Speech Recognition: A Solution for the Analysis and Processing of Lecture Recordings
Found in: Computer and Information Science, ACIS International Conference on
By Haojin Yang,Christoph Oehlke,Christoph Meinel
Issue Date:May 2011
pp. 201-206
Since recording technology has become more robust and easier to use, more and more universities are taking the opportunity to record their lectures and put them on the Web in order to make them accessable by students. The automatic speech recognition (ASR)...
 
Applying Erasure Codes for Fault Tolerance in Cloud-RAID
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Maxim Schnjakin,Tobias Metzke,Christoph Meinel
Issue Date:December 2013
pp. 66-75
Public cloud storage services enable organizations to manage data with low operational expenses. However, the benefits come along with challenges and open issues such as security and reliability. In our work, we presented a system that improves availabilit...
 
Towards Context-Aware Service-Oriented Semantic Reputation Framework
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Rehab Alnemr,Maxim Schnjakin,Christoph Meinel
Issue Date:November 2011
pp. 362-372
Reputation has been explored in diverse disciplines such as artificial intelligence, electronic commerce, peer-to-peer network, and multi-agent systems. Recently it has been a vital component for ensuring trust in web services and service oriented architec...
 
Secure Neighbor Discovery: Review, Challenges, Perspectives, and Recommendations
Found in: IEEE Security & Privacy Magazine
By Ahmad AlSa'deh,Christoph Meinel
Issue Date:July 2012
pp. 26-34
Neighbor Discovery Protocol (NDP) is one of the main protocols in IPv6 suite. However, it has no security mechanisms and is vulnerable to various attacks. Using an RSA key pair, cryptographically generated addresses, a digital signature, and X.509 certific...
 
Whom to Trust? Generating WS-Security Policies Based on Assurance Information
Found in: Web Services, European Conference on
By Ivonne Thomas,Robert Warschofsky,Christoph Meinel
Issue Date:September 2011
pp. 65-72
As input for authorization decisions as well as to offer personalized services, service providers often require information about their users' identity attributes. In open identity management systems, these identity attributes are not necessarily managed b...
 
SecureSOA
Found in: Services Computing, IEEE International Conference on
By Michael Menzel, Christoph Meinel
Issue Date:July 2010
pp. 146-153
Service-oriented Architectures (SOA) facilitate the provision and orchestration of business services to enable a faster adoption to changing business demands. Web Services provide a technical foundation to realize this paradigm and support a variety of dif...
 
Browsing within Lecture Videos Based on the Chain Index of Speech Transcription
Found in: IEEE Transactions on Learning Technologies
By Stephan Repp, Andreas Groβ, Christoph Meinel
Issue Date:July 2008
pp. 145-156
The number of digital lecture video recordings has increased dramatically since recording technology became easier to use. The accessibility and ability to search within this large archive are limited and difficult. Additionally, detailed browsing in video...
 
Communication-Aware and Energy-Efficient Scheduling for Parallel Applications in Virtualized Data Centers
Found in: 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing (UCC)
By Ibrahim Takouna,Roberto Rojas-Cessa,Kai Sachs,Christoph Meinel
Issue Date:December 2013
pp. 251-255
In this paper, we propose Peer VMs Aggregation (PVA) to enable dynamic discovery of communication patterns and reschedule VMs based on the determined communication patterns using VM migration. In the implementation, we consider that communication delays oc...
 
Energy and Performance Efficient Consolidation of Independent VMs in Virtualized Data Center by Exploiting VMs' Memory Demand Heterogeneity
Found in: 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing (UCC)
By Ibrahim Takouna,Christoph Meinel
Issue Date:December 2013
pp. 315-320
Virtualization allows server consolidation to reduce energy consumption and agile resource provisioning. Consolidation with unaware of the memory-access demand can cause inefficient resource utilization and degrade system performance. In this paper, we pro...
 
Catch the Spike: On the Locality of Individual BGP Update Bursts
Found in: 2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)
By Andrey Sapegin,Feng Cheng,Christoph Meinel
Issue Date:December 2013
pp. 78-83
Internet scalability depends on scalability of its core routing protocol - Border Gateway Protocol (BGP). However, dynamics of BGP still conceal many unanswered questions. Most of these questions are related to BGP update messages: root cause of update spi...
 
A flexible framework for detecting IPv6 vulnerabilities
Found in: Proceedings of the 6th International Conference on Security of Information and Networks (SIN '13)
By Christoph Meinel, Christoph Mueller, Christoph Sterz, Hosnieh Rafiee, Jannik Streek, Lukas Niemeier
Issue Date:November 2013
pp. 196-202
Security has recently become a very important concern for entities using IPv6 networks. This is especially true with the recent news reports where governments and companies have admitted to credible cyber attacks against them in which confidential informat...
     
Identify Emergent Trends Based on the Blogosphere
Found in: 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Patrick Hennig,Philipp Berger,Christoph Meinel
Issue Date:November 2013
pp. 41-45
Information about upcoming trends is a valuable knowledge for both, companies and individuals. Detecting trends for a certain topic is of special interest. According to the latest information over 200 million blogs exist in the World Wide Web. Hence, every...
 
Identifying Domain Experts in the Blogosphere -- Ranking Blogs Based on Topic Consistency
Found in: 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Philipp Berger,Patrick Hennig,Christoph Meinel
Issue Date:November 2013
pp. 252-259
Current ranking algorithms, such as Page Rank, Technorati authority, and BI-Impact, favor blogs that report on a diversity of topics since those attract a large audience and thus more visitors, links, and comments. On the other side, niche blogs with a ver...
 
Tracking Visitor Engagement in the Blogosphere for Leveraging Rankings
Found in: 2013 International Conference on Social Computing (SocialCom)
By Patrick Hennig,Philipp Berger,Christoph Meinel,Maria Graber,Jens Hildebrandt,Stefan Lehmann,Cathleen Ramson
Issue Date:September 2013
pp. 365-372
Current blog search engines use rankings, such as BIImpact or B2Rank, focusing on the link structure and thereat criteria externally extracted for blogs. A good, but due to the unavailability, not often used criteria is the visitor engagement. This metric ...
 
A Secure, Flexible Framework for DNS Authentication in IPv6 Autoconfiguration
Found in: 2013 IEEE 12th International Symposium on Network Computing and Applications (NCA)
By Hosnieh Rafiee,Christoph Meinel
Issue Date:August 2013
pp. 165-172
The Domain Name System (DNS) is an essential part of the Internet on whose function many other protocols rely. One key DNS function is Dynamic Update, which allows hosts on the network to make updates to DNS records dynamically, without the need for restar...
 
HPISecure: Towards Data Confidentiality in Cloud Applications
Found in: 2013 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)
By Eyad Saleh,Christoph Meinel
Issue Date:May 2013
pp. 605-609
Cloud computing has emerged over the last years as a new model of delivering computation to consumers. Due to the nature of the cloud, where the data and the computation are beyond the control of the user, data privacy and security becomes a vital factor i...
 
DNS Update Extension to IPv6 Secure Addressing
Found in: 2013 Workshops of International Conference on Advanced Information Networking and Applications (WAINA)
By Hosnieh Rafiee,Martin von Lowis,Christoph Meinel
Issue Date:March 2013
pp. 896-902
The Domain Name System (DNS) is a primary component of the Internet. It was for this reason that a DNS update mechanism was created and implemented giving hosts the ability to dynamically change DNS entries. But this new mechanism exposed DNS servers to ne...
 
Dynamic scalability and contention prediction in public infrastructure using Internet application profiling
Found in: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)
By Wesam Dawoud,Ibrahim Takouna,Christoph Meinel
Issue Date:December 2012
pp. 208-216
Recently, the advance of cloud computing services has attracted many customers to host their Internet applications in the cloud. Infrastructure as a Service (IaaS) is on top of these services where it gives more control over the provisioned resources. The ...
 
Analysis and Simulation of HPC Applications in Virtualized Data Centers
Found in: 2012 IEEE International Conference on Green Computing and Communications (GreenCom)
By Ibrahim Takouna,Wesam Dawoud,Christoph Meinel
Issue Date:November 2012
pp. 498-507
Cloud computing is a consolidation environment that hosts heterogeneous applications. Currently, clouds use virtualization technologies to provide an isolated execution environment and agile resource provisioning. Furthermore, live migration is widely expl...
 
Cryptographically Generated Addresses (CGAs): Possible Attacks and Proposed Mitigation Approaches
Found in: 2012 IEEE 12th International Conference on Computer and Information Technology (CIT)
By Ahmad Alsadeh,Hosnieh Rafiee,Christoph Meinel
Issue Date:October 2012
pp. 332-339
Cryptographically Generated Addresses (CGAs) were mainly designed to prove address ownership and to prevent the theft of existing IPv6 addresses by binding the owner's public key to the generated address. The address owner uses a corresponding private key ...
 
Increasing Spot Instances Reliability Using Dynamic Scalability
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Wesam Dawoud,Ibrahim Takouna,Christoph Meinel
Issue Date:June 2012
pp. 959-961
Traditionally, Infrastructure as a Service (IaaS)providers deliver their services as Reserved or On-Demand instances. Spot Instances (SIs) is a complementary service that allows customers to bid on the free capacity at the provider data centers. Therefore,...
 
Multicore-based auto-scaling SEcure Neighbor Discovery for Windows operating systems
Found in: Information Networking, International Conference on
By Hosnieh Rafiee,Ahmad Alsa'deh,Christoph Meinel
Issue Date:February 2012
pp. 269-274
SEcure Neighbor Discovery (SEND) is proposed to counter IPv6 Neighbor Discovery Protocol (NDP) security threats. However, SEND is compute-intensive. Fulfilling Hash2 condition in Cryptographically Generated Addresses (CGA) is the main heavy part of SEND. U...
 
Stopping time condition for practical IPv6 Cryptographically Generated Addresses
Found in: Information Networking, International Conference on
By Ahmad Alsa'deh,Hosnieh Rafiee,Christoph Meinel
Issue Date:February 2012
pp. 257-262
Cryptographically Generated Addresses (CGA) are employed as an authentication mechanism in IPv6 network to realize the proof of address ownership without relying on any trust authority. The security parameter (Sec) indicates the security level of the CGA a...
 
Automatic Lecture Video Indexing Using Video OCR Technology
Found in: Multimedia, International Symposium on
By Haojin Yang,Maria Siebert,Patrick Lühne,Harald Sack,Christoph Meinel
Issue Date:December 2011
pp. 111-116
During the last years, digital lecture libraries and lecture video portals have become more and more popular. However, finding efficient methods for indexing multimedia still remains a challenging task. Since the text displayed in a lecture video is closel...
 
Accurate Mutlicore Processor Power Models for Power-Aware Resource Management
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Ibrahim Takouna,Wesam Dawoud,Christoph Meinel
Issue Date:December 2011
pp. 419-426
Power management is one of the biggest challenges facing current data centers. As processors consume the dominant amount of power in computer systems, power management of multicore processors is extremely significant. An efficient power model that accurate...
 
CS-CGA: Compact and more Secure CGA
Found in: Networks, IEEE International Conference on
By Ahmad AlSa'deh, Feng Cheng,Christoph Meinel
Issue Date:December 2011
pp. 299-304
Cryptographically Generated Address (CGA) is one of the most novel security features introduced in IPv6 suite. CGA is designed to prevent addresses theft without relying on trust authority or additional security infrastructures. However, CGA is relatively ...
 
Lecture Video Indexing and Analysis Using Video OCR Technology
Found in: Signal-Image Technologies and Internet-Based System, International IEEE Conference on
By Haojin Yang,Maria Siebert,Patrick Lühne,Harald Sack,Christoph Meinel
Issue Date:December 2011
pp. 54-61
The text displayed in a lecture video is closely related to the lecture content. Therefore, it provides a valuable source for indexing and retrieving lecture video contents. Textual content can be detected, extracted and analyzed automatically by video OCR...
 
An Attribute Assurance Framework to Define and Match Trust in Identity Attributes
Found in: Web Services, IEEE International Conference on
By Ivonne Thomas,Christoph Meinel
Issue Date:July 2011
pp. 580-587
Identity federation denotes a concept for the controlled sharing of user authentication and user attributes between independent trust domains. Using WS-Federation, service providers and identity providers can set up a Circle of Trust, a so called federatio...
 
Automated Security Service Orchestration for the Identity Management in Web Service Based Systems
Found in: Web Services, IEEE International Conference on
By Robert Warschofsky,Michael Menzel,Christoph Meinel
Issue Date:July 2011
pp. 596-603
Today, there is a huge amount of security services that can be used to implement different security requirements in Web Service based systems. For example, identity management services are required for authentication and authorization whereas message loggi...
 
Measuring Expertise in Online Communities
Found in: IEEE Intelligent Systems
By Ching-man Au Yeung, Michael G. Noll, Christoph Meinel, Nicholas Gibbins, Nigel Shadbolt
Issue Date:January 2011
pp. 26-32
<p>The Spamming-Resistant Expertise Analysis and Ranking (Spear) algorithm is more resistant to spammers than other methods such as the HITS algorithm and other statistical measures for collaborative tagging systems.</p>
 
Transformation and Aggregation of Web Service Security Requirements
Found in: Web Services, European Conference on
By Robert Warschofsky, Michael Menzel, Christoph Meinel
Issue Date:December 2010
pp. 43-50
Service-oriented Architectures support the provision, discovery, and usage of services in different application contexts. The Web Service specifications provide a technical foundation to implement this paradigm and provide mechanisms to face the new securi...
 
A Flexible and Efficient Alert Correlation Platform for Distributed IDS
Found in: Network and System Security, International Conference on
By Sebastian Roschke, Feng Cheng, Christoph Meinel
Issue Date:September 2010
pp. 24-31
Intrusion Detection Systems (IDS) have been widely deployed in practice for detecting malicious behavior on network communication and hosts. The problem of false-positive alerts is a popular existing problem for most of IDS approaches. The solution to addr...
 
Realization of an Expandable Search Function for an E-Learning Web Portal
Found in: Computer and Information Science, ACIS International Conference on
By Maria Siebert, Christoph Meinel
Issue Date:August 2010
pp. 361-366
When providing a huge amount of content to users, the search engine is an important part of the platform. On most web sites it is the most important entry point to the data archive. That is why it is an interesting research topic. In this paper we present ...
 
Mobile Web Usability Evaluation - Combining the Modified Think Aloud Method with the Testing of Emotional, Cognitive and Conative Aspects of the Usage of a Web Application
Found in: Computer and Information Science, ACIS International Conference on
By Franka Moritz, Christoph Meinel
Issue Date:August 2010
pp. 367-372
This paper proposes a usability testing method that alters a given usability testing method to make it less costly and time consuming for the investigator. The usage of user-centred methods is motivated and a combination of two user-centred methods suggest...
 
Establishing an Expandable Architecture for a Tele-teaching Portal
Found in: Computer and Information Science, ACIS International Conference on
By Maria Siebert, Franka Moritz, Christoph Meinel
Issue Date:August 2010
pp. 323-328
The complexity of web applications becomes a big problem, when applications are growing. Especially if new algorithms should be tested and compared, it is important to be able to separate the newly implemented functions from the core system. It is not enou...
 
Visualizing Blog Archives to Explore Content- and Context-Related Interdependencies
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Justus Bross, Patrick Schilf, Christoph Meinel
Issue Date:September 2010
pp. 647-652
There has been virtually little in the way of user interfaces designed for the exploration and information gathering from large weblog datasets to allow for an integrated and aggregated knowledge collection and information analysis tool. Users have to rely...
 
The Service Security Lab: A Model-Driven Platform to Compose and Explore Service Security in the Cloud
Found in: Services, IEEE Congress on
By Michael Menzel, Robert Warschofsky, Ivonne Thomas, Christian Willems, Christoph Meinel
Issue Date:July 2010
pp. 115-122
Cloud computing enables the provisioning of dynamically scalable resources as a service. Next to cloud computing, the paradigm of Service-oriented Architectures emerged to facilitate the provisioning of functionality as services. While both concepts are co...
 
A Pattern-Driven Generation of Security Policies for Service-Oriented Architectures
Found in: Web Services, IEEE International Conference on
By Michael Menzel, Robert Warschofsky, Christoph Meinel
Issue Date:July 2010
pp. 243-250
Service-oriented Architectures support the provision, discovery, and usage of services in different application contexts. The Web Service specifications provide a technical foundation to implement this paradigm. Moreover, mechanisms are provided to face th...
 
Mapping the Blogosphere with RSS-Feeds
Found in: Advanced Information Networking and Applications, International Conference on
By Justus Bross, Matthias Quasthoff, Philipp Berger, Patrick Hennig, Christoph Meinel
Issue Date:April 2010
pp. 453-460
The massive adoption of social media has provided new ways for individuals to express their opinions online. The blogosphere, an inherent part of this trend, contains a vast array of information about a variety of topics. It is thus a huge think tank that ...
 
A Specialized Tool for Simulating Lock-Keeper Data Transfer
Found in: Advanced Information Networking and Applications, International Conference on
By Feng Cheng, Thanh-Dien Tran, Sebastian Roschke, Christoph Meinel
Issue Date:April 2010
pp. 182-189
Simulation is an efficient way to model a real system by a computer program and is used to study and evaluate the characteristics or behaviors of the system. In this paper, we present an effective simulation tool that is designed for simulating the working...
 
Intrusion Detection in the Cloud
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Sebastian Roschke, Feng Cheng, Christoph Meinel
Issue Date:December 2009
pp. 729-734
Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. IDS management is an important capability for distributed IDS solutions, which makes it possible to integrate and handle different typ...
 
A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Sebastian Roschke, Feng Cheng, Thanh-Dien Tran, Christoph Meinel
Issue Date:October 2009
pp. 190-196
Performance is a critical aspect for all kinds of security solutions. The Lock-Keeper is a high-level security solution which implements the concept of physical separation. To evaluate and predict the performance of Lock-Keeper, the internal data transfer ...
 
A Security Meta-model for Service-Oriented Architectures
Found in: Services Computing, IEEE International Conference on
By Michael Menzel, Christoph Meinel
Issue Date:September 2009
pp. 251-259
Services account for a major part of the IT industry today. Companies increasingly like to focus on their core expertise area and use IT services to address all their peripheral needs. Services Computing is a new science which aims to study and better unde...
 
Enhancing Claim-Based Identity Management by Adding a Credibility Level to the Notion of Claims
Found in: Services Computing, IEEE International Conference on
By Ivonne Thomas, Christoph Meinel
Issue Date:September 2009
pp. 243-250
Claim-based identity management denotes an open identity model which uses the notion of claims to describe identity attributes. A claim is an identity attribute named with an abstract identifier (e.g. a URI), which applications and services can use to spec...
 
Constructing a Context-Aware Service-Oriented Reputation Model Using Attention Allocation Points
Found in: Services Computing, IEEE International Conference on
By Rehab Alnemr, Justus Bross, Christoph Meinel
Issue Date:September 2009
pp. 451-457
In this paper we examine the problem of rich information environments and the need to narrow the agents attention to what is important for them to interact and later to evaluate and transfer reputation values, using Attention Allocation technique (AA). We ...
 
Automatic Extraction of Semantic Descriptions from the Lecturer's Speech
Found in: International Conference on Semantic Computing
By Stephan Repp, Christoph Meinel
Issue Date:September 2009
pp. 513-520
The number of digital lecture video recordings has increased dramatically since recording technology became easier to use. The accessibility and ability to search within this large archive are limited and difficult. Manual annotation is time-consuming and ...
 
Enabling Video-Blogging without Relying on External Service-Providers
Found in: Computational Science and Engineering, IEEE International Conference on
By Justus Bross, Janosch Oppermann, Christoph Meinel
Issue Date:August 2009
pp. 515-522
Emerging web 2.0 technologies are increasingly making use of multimedia formats and furthermore allow users to produce their own content and refurbish information in a highly creative and collaborative way themselves. A new kind of web-enabled platform tha...
 
An Extensible and Virtualization-Compatible IDS Management Architecture
Found in: Information Assurance and Security, International Symposium on
By Sebastian Roschke, Feng Cheng, Christoph Meinel
Issue Date:August 2009
pp. 130-134
Efficient Intrusion Detection System (IDS) management is a prominent capability for distributed IDS solutions, which makes it possible to integrate and handle different types of sensors or collect and synthesize alerts generated from multiple hosts located...
 
Spurring Design Thinking through Educational Weblogging
Found in: Computational Science and Engineering, IEEE International Conference on
By Justus Bross, Ahmet Emre Acar, Patrick Schilf, Christoph Meinel
Issue Date:August 2009
pp. 903-908
A growing number of those millions of internet users that are down to the present day excessively using weblogs to reflect on their experiences, recommendations and thoughts in a private or business context, now increasingly employ this medium to bring the...
 
 1  2 Next >>