Volume 1 Number 1 March 2010

    
An Improved Schema-Sharing Technique for a Software as a Service Application to Enhance Drinking Water Safety

Franclin S. Foping, Ioannis M. Dokas, John Feehan, Syed Imran

https://doi.org/

Abstract Despite their dominance and wide acceptance, relational databases are unable to meet all waits and needs of multi-tenant applications. By way of example, relational databases do not provide any “tenant” concept, therefore a typical relational database has to be tweaked to support multi-tenancy. This paper addresses this shortage by presenting a new schema-sharing technique for multi-tenant applications. Our approach is... Read More


Cooperative Architecture Applied for Distributed Intrusion Forecasting Systems (DIFS)

Elvis Pontes,Adilson E. Guelfi

https://doi.org/

Abstract Nowadays, integrity, availability and reliability from information systems have been threatened by intrusions and Unwanted Internet Traffic (UIT), Intrusion Detection Systems (IDS) are largely employed to cope with UIT, but IDS lack in security as they are mainly based on postmortem approaches: detection and/or blocking happen only after UIT has inflicted serious damage. Intending to improve intrusion detection, in our... Read More


Trans-Border E-Commerce: The Perspectives from Canada and the UK

Dragana Martinovic,Victor Ralevich

https://doi.org/

Abstract In this paper the authors compare Canadian and the United Kingdom practices in the management of electronic information on the Internet. The focus is primarily on policies and practices of electronic data storage and transfer, protection of privacy, and electronic business data transfer. The authors examined the impact that national personal data protection legislation and regulations have on electronic data... Read More


Boosting TCP with Cross-Layer Information Awareness in Wireless Networks

Mouhcine Guennoun

https://doi.org/

Abstract It has been demonstrated through simulation and experimental studies that TCP protocol suffers from a significant drop of performance when communicating over wireless networks. In general, packets can be lost for three main reasons: 1) Congestion 2) Link failure due to node mobility, and 3) Losses due to transmission errors. However, TCP doesn’t distinguish between these three types of packet... Read More