1,435 research outputs found

    Software cost estimation

    Get PDF
    The paper gives an overview of the state of the art of software cost estimation (SCE). The main questions to be answered in the paper are: (1) What are the reasons for overruns of budgets and planned durations? (2) What are the prerequisites for estimating? (3) How can software development effort be estimated? (4) What can software project management expect from SCE models, how accurate are estimations which are made using these kind of models, and what are the pros and cons of cost estimation models

    A secure and lightweight ad-hoc routing algorithm for personal networks

    Get PDF
    Over the past few years, there has been increasing interest in utilizing Personal Area Networks (PANs) to offer users innovative and personalized services. This interest is a consequence of the widespread use of mobile devices such as laptops, mobile phones, PDAs, digital cameras, wireless headsets, etc. to carry out a variety of user-centric tasks. The PAN itself is built upon an ad-hoc network where devices trust their neighbors to route their packets. The cooperative nature of ad-hoc networks allows malicious nodes to easily cripple the network by inserting false route information, replaying old messages, modifying messages of other nodes, etc. An applicable area still under research, and the focus of this paper, is secure routing protocols for ad-hoc networks. To achieve availability in the PAN, the routing protocol used must be robust against both dynamically changing topology and malicious attacks. However, the heterogeneous nature of Personal Network (PN) devices means that traditional security mechanisms are too resource intensive to be sufficient by themselves. This paper describes a new ad-hoc secure routing protocol for Personal Networks (PNs), suitable in a limited multi-hop scenario. This protocol is based on ADOV and relies on efficient cryptographic primitives to safeguard the security and privacy of PN users. Following that, a number of attacks in the area of ad-hoc networks are discussed, and it is shown that the new algorithm protects against multiple un-coordinated active attackers, in spite of compromised nodes in the network

    A security architecture for personal networks

    Get PDF
    Abstract Personal Network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use. In this paper we introduce a security architecture designed for PNs. Our aim is to use secure but lightweight mechanisms suitable for resource constrained devices and wireless communication. We support pair-wise keys for secure cluster formation and use group keys for securing intra-cluster communication. In order to analyze the performance of our proposed mechanisms, we carry out simulations using ns-2. The results show that our mechanisms have a low overhead in terms of delay and energy consumption

    Alveolaire zuurstofspanning en longcirculatie

    Get PDF
    Door middel van een "trachea-diviseur" kan men bij konijnen de linker- en rechterlong verschillende gassen laten ademen. Deze methode biedt boven andere, die voor het tot stand brengen van een gescheiden ventilatie in de litteratuur zijn beschreven, het voordeel van een gemakkelijke uitvoering, een grote betrouwbaarheid en een minimale stenose van de luchtwegen. .... Zie: Samenvattin

    Wat bepaalt de kosten van software?

    Get PDF

    2nd Place Essay: The Art of Leadership

    Get PDF
    In response to the essay prompt: Leadership is more art than science. Effective leadership is an art. Leadership is not a direct set of rules to follow or books to read. Finding the correct way to lead cannot be found in a textbook. Leadership is a characteristic that is learned over time. Leadership is forming relationships, making connections, and meeting the needs of your followers. Just as art is full of many possibilities and not defined to one answer, so too is leadership. The most effective form of leadership is one that incorporates flexibility, creativity, and the idea that there is never a right or wrong answer

    The Mathematics of Spot It

    Get PDF
    Spot It™ is a fun, fast paced game for people of all ages. The game appears to have a rich mathematical structure, which we investigated, using combinatorial analysis. We constructed some similar Spot It type games with a different number of cards, and displayed that some games are impossible to complete. In particular, the original Spot It game has eight objects on each card; however, it is impossible to construct a complete game (a game in which every object appears with every other object) in which every card has seven objects. We have investigated the mathematics behind the game

    Poster Abstract: Hierarchical Subchannel Allocation for Mode-3 Vehicle-to-Vehicle Sidelink Communications

    Get PDF
    In V2V Mode-3, eNodeBs assign subchannels to vehicles in order for them to periodically broadcast CAM messages \cite{b2}. A crucial aspect is to ensure that vehicles in the same cluster will broadcast in orthogonal time subchannels\footnote{A subchannel is a time-frequency resource chunk capable of sufficiently conveying a CAM message.} to avoid conflicts. In general, resource/subchannel allocation problems can be represented as weighted bipartite graphs. However, in this scenario there is an additional time orthogonality constraint which cannot be straightforwardly handled by conventional graph matching methods \cite{b3}. Thus, in our approach the mentioned constraint has been taken into account. We also perform the allocation task in a sequential manner based on the constrainedness of each cluster. To illustrate the gist of the problem, in Fig. 1 we show two partially overlapping clusters where a conflict between vehicles V8V_8 and V10V_{10} is generated as the allotted subchannels are in the same subframe
    • …
    corecore