0000000000202914

AUTHOR

Oleksiy Mazhelis

showing 55 related works from this author

Vertical Integration due to Software Systems' Modularity

2009

In their product portfolio, OSS/BSS software vendors make products pre-integrated with each other as well as with other related OSS/BSS products. Prior to the full-scale development and integration, it is vital for these vendors to assess which products are reasonable to integrate. Such integration of software may be aimed at achieving different goals, such as: Reducing software integration efforts. Software vendors aim at maximizing their profits, whereas their customers (i.e., CSPs) aim at minimizing their costs by avoiding the integration job. As a result, to approach a win–win scenario, vendors provide already integrated products or subsystems (pre-integrated modules). Sharing similar k…

business.industryComputer sciencemedia_common.quotation_subjectReuseModularityVertical integrationSoftwareKnowledge baseSystems engineeringSystem integrationQuality (business)Software systemSoftware engineeringbusinessmedia_common
researchProduct

Modeling software integration scenarios for telecommunications operations software vendors

2007

- Telecom operators deploy a vast number of software systems to support their operations. Vendors of these systems often integrate such software in their products in order to enable innovations, minimize the customer's integration efforts, etc. Different integration scenarios can be envisioned, and the issue of identifying more beneficial scenarios is of a great importance to the vendors. This paper focuses on analyzing different integration scenarios in the context of telecommunications operations software. For each scenario, the overall modularity of the set of software systems is evaluated, and the expected benefits of the scenario are modeled in terms of the modularity gain it provides.…

Modularity (networks)EngineeringTelecommunications control softwareSoftwarebusiness.industryOperations support systemIntegrated softwareSystems engineeringTelecommunications serviceScenario analysisSoftware systembusinessTelecommunications2007 IEEE International Conference on Industrial Engineering and Engineering Management
researchProduct

Towards enabling privacy preserving smart city apps

2016

Smart city applications are increasingly relying on personally identifiable data. A disclosure of such a data to a platform provider and possible 3rd parties represents a risk to the privacy of the application users. To mitigate the privacy risk, two-layer privacy-preserving platform architecture is introduced, wherein the personally identifiable information is dealt with at the inner layer (executed in a trusted environment), whereas only generic and personally unidentifiable information is made available to the apps at the outer layer of the architecture — e.g., in a form of app-specific events. The essential requirements for the platform are described, and the architectural implications …

ta113smart city application platformInformation privacyPrivacy by DesignComputer sciencebusiness.industryPrivacy softwareMultitier architectureInternet privacy020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreprivacylayered architecture020204 information systemsSmart city0202 electrical engineering electronic engineering information engineeringLayer (object-oriented design)ArchitecturebusinessPersonally identifiable informationcomputerpersonally identifiable information
researchProduct

Specifying Patterns for Mobile Application Domain Using General Architectural Components

2005

Software companies adopt patterns as a means to improve architecture and design practices. During recent years, the application of patterns has extended from general software applications to specific problem domains. In a new domain, suitable patterns fitting to the essential design problems in the new context need to be identified. In this paper, we introduce a general architectural model of mobile applications, which can be used to identify and organise essential patterns in mobile-application design process. This model is employed to construct a high-level architecture of a particular application. For each component of the architecture, the model may suggest candidate patterns that can b…

EngineeringArchitectural patternbusiness.industryApplication domainSoftware design patternSystems engineeringDesign processBehavioral patternStructural patternSoftware engineeringbusinessSoftware architectureArchitectural model
researchProduct

Internet-of-things market, value networks, and business models : state of the art report

2013

ecosystemliiketoimintamallitInternetmarknadenmarketuusi taloustietoliikenneverkotekosystemaffärsverksamhetsmodellervalue networkekosysteemitmarkkinatinternet-of-thingsesineiden internetbusiness modelstietoverkottietotekniikka-ala
researchProduct

Analysing software integration scenarios: the case of telecommunications operations software

2008

Telecom operators deploy a vast number of software systems to support their operations. Vendors of this software often integrate in their products several software systems, in order to enable innovations, minimize customer's integration efforts, etc. Different integration scenarios can be envisioned, and the issue of identifying more beneficial scenarios is of a great importance to the vendors. This paper aims at analyzing different software integration scenarios from the viewpoint of their support for innovations, and focuses on the context of telecommunications operations software. For each scenario, the overall modularity of the set of software systems is evaluated, and the expected bene…

Social software engineeringInformation Systems and ManagementResource-oriented architectureComputer sciencebusiness.industryStrategy and ManagementMechanical EngineeringSoftware developmentManagement Science and Operations ResearchSoftware analyticsSoftware sizingSoftware constructionSoftware systembusinessTelecommunicationsEngineering (miscellaneous)System integration testingInternational Journal of Management Science and Engineering Management
researchProduct

A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users

2003

Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.

AuthenticationUser authenticationResource (project management)BiometricsHuman–computer interactionComputer scienceIdentity (object-oriented programming)Security levelComputer securitycomputer.software_genreMobile devicecomputer
researchProduct

Cost benefits of flexible hybrid cloud storage : Mitigating volume variation with shorter acquisition cycle

2016

The hybrid cloud storage is investigated as a case of concurrent sourcing.The paper introduces an analytical model for hybrid cloud storage costs.We study the role of acquisition cycle and volume variation in hybrid cloud costs.Shortening the reassessment interval reduces the volume non-stationarity.Shortening the reassessment interval reduces the total hybrid costs. Hybrid cloud storage combines cost-effective but inflexible private storage along with flexible but premium-priced public cloud storage. As a form of concurrent sourcing, it offers flexibility and cost benefits to organizations by allowing them to operate at a cost-optimal scale and scope under demand volume uncertainty. Howeve…

EngineeringOperations researchvolume variationCloud computing02 engineering and technologyInterval (mathematics)plural governanceReduction (complexity)0502 economics and business0202 electrical engineering electronic engineering information engineeringreassessment intervalFlexibility (engineering)ta113Scope (project management)business.industryScale (chemistry)05 social sciencesVolume (computing)020207 software engineeringconcurrent sourcingReliability engineeringHardware and Architectureacquisition intervalhybrid cloud storagebusinessCloud storage050203 business & managementSoftwareInformation Systems
researchProduct

Detection of Fake Profiles in Social Media - Literature Review

2017

ta113identiteettiväärennöksetfalse identitiessocial network analysisverkkoprofiilitComputer sciencebusiness.industrysocial mediaInternet privacysosiaalinen mediafake profilesväärennöksetidentiteettiSocial mediata518businessProceedings of the 13th International Conference on Web Information Systems and Technologies
researchProduct

Defining Complexity Factors for the Architecture Evaluation Framework

2006

The design and implementation of telecommunication systems is an incremental and iterative process, and system architectures may need to be revised and refined several times during their lifetime. Formal evaluation facilitates the identification of the weak points, where improvements are due in these architectures. In the domain of telecommunications, such evaluation can be based on the Architecture Evaluation Framework (AEF). During the evaluation, a deep understanding of the processes within a system is needed. Meanwhile, the systems being designed are usually complex systems encompassing a large number of components with an intricate pattern of interaction between them. As a result, it i…

Iterative and incremental developmentIdentification (information)business.industryComputer scienceInformation systemComplex systemInformation technologySoftware systemSoftware architecturebusinessSoftware engineeringField (computer science)Domain (software engineering)Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)
researchProduct

Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications

2014

Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…

ta113Information Systems and ManagementHypertext Transfer Protocolta213Cost efficiencyComputer scienceSmart objectsbusiness.industrycomputer.internet_protocolta111Computer securitycomputer.software_genreManagement Information SystemsConstrained Application ProtocolWeb of ThingsArts and Humanities (miscellaneous)Developmental and Educational PsychologyOverhead (computing)businessta512Protocol (object-oriented programming)computerInformation SystemsComputer networkDecision Support Systems
researchProduct

Applying Wavelet Packet Decomposition and One-Class Support Vector Machine on Vehicle Acceleration Traces for Road Anomaly Detection

2013

Road condition monitoring through real-time intelligent systems has become more and more significant due to heavy road transportation. Road conditions can be roughly divided into normal and anomaly segments. The number of former should be much larger than the latter for a useable road. Based on the nature of road condition monitoring, anomaly detection is applied, especially for pothole detection in this study, using accelerometer data of a riding car. Accelerometer data were first labeled and segmented, after which features were extracted by wavelet packet decomposition. A classification model was built using one-class support vector machine. For the classifier, the data of some normal seg…

Computer sciencebusiness.industryIntelligent decision support systemPattern recognitionMachine learningcomputer.software_genreWavelet packet decompositionSupport vector machineComputerSystemsOrganization_MISCELLANEOUSAnomaly detectionVehicle accelerationArtificial intelligencebusinesscomputerClassifier (UML)
researchProduct

Assessing Cloud Infrastructure Costs in Communications-Intensive Applications

2012

By deploying cloud infrastructure services, companies strive at achieving faster time to market, improved scalability, lower up-front costs, and lower IT management overhead, among other benefits. However, in longer term, the use of cloud infrastructure may incur significant costs; furthermore, these costs depend both on the required infrastructure resources and on the mode of infrastructure deployment. Therefore, the choice of a particular deployment mode should be justified with a systematic analysis of the associated costs. In this paper, a model for assessing the costs of alternative cloud infrastructure deployment scenarios is introduced. This model decomposes the infrastructure costs …

Factor costRisk analysis (engineering)Software deploymentbusiness.industryComputer scienceTotal costOverhead (business)Information technology managementCloud computingTotal cost of ownershipbusinessEconomies of scale
researchProduct

Costs of Using Hybrid Cloud Infrastructure: Towards a General Framework

2012

Cloud computing infrastructure is a state-of-the-art computing as a utility paradigm, offering individuals and organizations instantly-available and scalable computing capacity. Organizations may deploy the cloud infrastructure in own data centers, as a private cloud, or use the public on-demand cloud infrastructure charged on a pay-per-use basis. The organizations may also adopt a hybrid solution, i.e. use public cloud capacity to complement the resources in the private cloud, e.g. during the periods of rapid growth in the demand. One of the important factors that affect the organizations’ decisions to adopt a hybrid cloud is the total cost of acquiring and managing the infrastructure. In …

cloud computing infrastructurehybrid cloudcost model
researchProduct

Economic Aspects of Hybrid Cloud Infrastructure: User Organization Perspective

2012

Adoption of cloud infrastructure promises enterprises numerous bene- ts, such as faster time-to-market and improved scalability enabled by on-demand provisioning of pooled and shared computing resources. In particular, hybrid clouds, by combining the private in-house capacity with the on-demand capacity of public clouds, promise to achieve both increased utilization rate of the in-house infrastructure and limited use of the more expensive public cloud, thereby lowering the total costs for a cloud user organization. In this paper, an analytical model of hybrid cloud costs is introduced, wherein the costs of computing and data communication are taken into account. Using this model, a cost-e c…

steepness of quantity discounthintajoustohybrid cloudprice elasticitycost modelcost optimization
researchProduct

Software Business in the Telecommunications Sector

2012

Operations and Business Support Systems (OSS/BSS) software of Communication Service Providers (CSP's) can be developed internally within the CSP or acquired from a Software Vendor. The software industry lifecycle model hypothesizes that software development is internal in the beginning of the industry's lifecycle, and that the share of external products increases when it matures. Empirical evidence shows signs of the OSS/BSS software industry approaching maturity. Current and future developments of the industry include the possibilities of utilizing the Software-as-a-Service (SaaS) model and Open Source software (OSSw). Both have gained increasing interest by the CSP's. However, the relativ…

Engineering managementSocial software engineeringbusiness.industrySoftware as a serviceBusiness softwarePersonal software processSoftware developmentPackage development processSoftware businessbusinessSoftware engineeringSoftware peer review
researchProduct

Role of Acquisition Intervals in Private and Public Cloud Storage Costs

2014

The volume of worldwide digital content has increased nine-fold within the last five years, and this immense growth is predicted to continue in the foreseeable future to reach 8 ZB by 2015. Traditionally, organizations proactively have built and managed their private storage facilities to cope with the growing demand for storage capacity. Recently, many organizations have instead welcomed the alternative of outsourcing their storage needs to the providers of public cloud storage services due to the proliferation of public cloud infrastructure offerings. The comparative cost-efficiency of these two alternatives depends on a number of factors, such as the prices of the public and private stor…

ta113Information Systems and Managementbusiness.industryDigital contentmedia_common.quotation_subjectControl (management)Volume (computing)ProvisioningCloud computingEnvironmental economicsManagement Information SystemsOutsourcingArts and Humanities (miscellaneous)Service (economics)Developmental and Educational PsychologyOperations managementBusinessCloud storageInformation Systemsmedia_commonDecision Support Systems
researchProduct

Real-time recognition of personal routes using instance-based learning

2011

Predicting routes is a critical enabler for many new location-based applications and services, such as warning drivers about congestion- or accident-risky areas. Hybrid vehicles can also utilize the route prediction for optimizing their charging and discharging phases. In this paper, a new lightweight route recognition approach using instance-based learning is introduced. In this approach, the current route is compared in real-time against the route instances observed in past, and the most similar route is selected. In order to assess the similarity between the routes, a similarity measure based on the longest common subsequence (LCSS) is employed, and an algorithm for incrementally evaluat…

ta113Similarity (geometry)business.industryComputer scienceSimilarity measureMachine learningcomputer.software_genreLongest common subsequence problemGlobal Positioning SystemRoute recognitionInstance-based learningArtificial intelligencebusinesscomputer2011 IEEE Intelligent Vehicles Symposium (IV)
researchProduct

The Place and Role of Security Patterns in Software Development Process

2006

Security is one of the key quality attributes for many contemporary software products. Designing, developing, and maintaining such software necessitates the use of a secure-software development process which specifies how achieving this quality goal can be supported throughout the development life-cycle. In addition to satisfying the explicitly-stated functional security requirements, such process is aimed at minimising the number of vulnerabilities in the design and the implementation of the software. The secure software development is a challenging task spanning various stages of the development process. This inherent difficulty may be to some extent alleviated by the use of the so-called…

Software Development ProcessSecuritytietokoneohjelmatohjelmistot (taiteet)suojaustietoturvaPatternsohjelmistokehitys
researchProduct

Software-as-a-Service in the Telecommunication Industry: Problems and Opportunities

2010

This paper examines the telecommunication software market and the adoption of topical Software-as-a-Service (SaaS) model in this vertical market. The aim of this paper is to estimate which telecommunication software products are likely to be provided as a Service, and to examine the potential factors disallowing SaaS adoption. The set aim is pursued by studying both the supplying software vendors and the communication service providers (CSP) as customers. A set of thematic interviews, software industry statistics and information disclosed by the software vendors are used in the analysis. The results of the analysis reveal challenges in adopting SaaS for telecommunication software as well as…

Service (systems architecture)Social software engineeringProcess managementbusiness.industrySoftware deploymentInformationSystems_INFORMATIONSYSTEMSAPPLICATIONSSoftware as a serviceSoftware developmentVertical marketSoftware systemService providerbusinessTelecommunications
researchProduct

Role of Data Communications in Hybrid Cloud Costs

2011

Rapid adoption of cloud services in recent years has been driven by multiple factors, such as faster time-to-market and improved scalability enabled by public cloud infrastructure. Hybrid clouds, combining the in-house capacities with on-demand capacity of public clouds, achieve both the increased utilization rate of the in-house infrastructure and the limited use of more expensive public cloud, thereby lowering the total costs for the cloud user. In this paper, an analytical model of hybrid cloud costs is introduced, wherein the costs of computing and data communication are taken into account. Using this model, the costefficient division of the computing capacity between the private and th…

Cloud computing securityhybrid cloudbusiness.industryTotal costComputer scienceDistributed computingVolume (computing)cost modeldata communications costCloud computingDivision (mathematics)kustannusmalli tietoliikenteen kustannuksetCloud testingScalabilityhybridi pilvibusinessUtilization rate
researchProduct

Advantages of Public Cloud Infrastructure in Different Technology Adoption Lifecycle Stages

2012

Independent software vendors (ISV) utilize cloud infrastructure for different reasons. We hypothesize that the motivation to adopt cloud infrastructure-as-a-service (IaaS) changes as the ISV’s product is getting adopted by the market. In this paper we consider how the infrastructure needs of ISVs change along the stages of ISV product’s adoption lifecycle, and analyze the potential benefits of utilizing IaaS in different stages. The analysis is illustrated with the cases of ISV firms with documented use of IaaS. These cases support the hypothesis that different benefits of IaaS are gaining importance along the adoption lifecycle.

EngineeringSoftwareProcess managementbusiness.industryData_MISCELLANEOUSCloud computingProduct (category theory)Marketingbusiness
researchProduct

An integrated identity verification system for mobile terminals

2005

PurposeTo report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user‐friendliness.Design/methodology/approachThe reported research corresponds to the building process in the design science research paradigm. The requirements to an identity verification system are defined and used in the selection of architecture components. Furthermore, various issues affecting the suitability of component distribution between a terminal and a remote server are considered.FindingsIn order to meet the stated requirements, in the proposed architecture static and dynamic identity verification is combine…

High-level verificationFunctional verificationComputer sciencebusiness.industryRuntime verificationLibrary and Information SciencesManagement Science and Operations ResearchManagement Information SystemsIntelligent verificationEmbedded systemSystems architectureIdentity (object-oriented programming)VerificationBusiness and International ManagementbusinessSoftware verificationInformation Management & Computer Security
researchProduct

A Generic Architectural Model Approach for Efficient Utilization of Patterns

2015

A software pattern describes the core of the solution to a problem that tends to (re-)occur in a particular environment. Such patterns are commonly used as a means to facilitate the creation of an architectural design satisfying the desired quality goals. In this chapter, the practical challenges of efficient usage of patterns in domain-specific software development are presented. The specific domain considered here is the mobile domain, for which is given a sample collection of potentially useful patterns. After that, a novel generic architectural model approach for organizing patterns is presented. In this approach, the identification of relevant patterns is considered as the process of r…

Architectural patternComputer architectureComputer scienceArchitectural modelDomain (software engineering)
researchProduct

Network Analysis of Platform Ecosystems: The Case of Internet of Things Ecosystem

2015

Software platform providers are often seen as the cornerstone of their business ecosystem, where the other ecosystem players utilize the platform’s standardized components together with complementary components for making applications. These platforms are also becoming a cornerstone of the emerging Internet of Things (IoT) business ecosystem comprised of the companies who provide Internet-enabled devices, applications, connectivity solutions, and the platforms for the IoT usage. While a number of enabling technologies for IoT is available, the question remains what kind of ecosystem emerges around IoT platform providers and whether this ecosystem is evolving in line with the theoretical mod…

World Wide WebEngineeringConsolidation (business)business.industryOrder (exchange)MainstreamCornerstoneEcosystemBusiness ecosystembusinessInternet of ThingsData scienceNetwork analysis
researchProduct

Masquerader detection in mobile context based on behaviour and environment monitoring

2007

Mobiilipäätelaitteiden, matkapuhelimien ja kämmentietokoneiden yleistymisen myötä riski näiden laitteiden väärinkäytölle on kasvanut. Matkapuhelimia ja kämmentietokoneita varastetaan ja hukataan koko ajan. Tällöin on mahdollista laitteen päätyminen henkilölle, joka voi käyttää laitetta luvattomasti. Luvattoman käytön estämiseksi on syntynyt tarve turvajärjestelmälle, jonka avulla voidaan varmistaa, että mobiilipäätelaitetta käyttävällä henkilöllä on oikeus laitteen käyttöön.Mazhelis kehitti väitöskirjassaan menetelmää, jonka avulla mobiilipäätelaitteen laillinen käyttäjä erotetaan muista henkilöistä. Tähän pyritään käytön aikaista toimintaa ja toimintaympäristön informaatiota analysoimalla.…

turvajärjestelmätmobiililaitteetComputer securityväärinkäyttömatkapuhelimet
researchProduct

A Techno-Economic Perspective of Constrained Application Protocol

2017

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…

Computer sciencePerspective (graphical)Techno economicEnvironmental economicsConstrained Application Protocol
researchProduct

Advantages of Public Cloud Infrastructure in Different Technology Adoption Lifecycle Stages

2012

Independent software vendors (ISV) utilize cloud infrastructure for different reasons. We hypothesize that the motivation to adopt cloud infrastructure-as-a-service (IaaS) changes as the ISV’s product is getting adopted by the market. In this paper we consider how the infrastructure needs of ISVs change along the stages of ISV product’s adoption lifecycle, and analyze the potential benefits of utilizing IaaS in different stages. The analysis is illustrated with the cases of ISV firms with documented use of IaaS. These cases support the hypothesis that different benefits of IaaS are gaining importance along the adoption lifecycle. peerReviewed

infrastructure as a service (IaaS)technology adoption lifecycleData_MISCELLANEOUScloud computing
researchProduct

Vertical Software Industry Evolution: The Impact of Software Costs and Limited Customer Base

2013

ContextSoftware systems are commonly used in a variety of industries as a means of automating organizational business processes. Initially, such software is often developed in-house by the vertical organizations possibly with the support of professional IT service providers; however, in many cases, internally developed software is eventually replaced with the software products provided by independent software vendors. These vendors often use license fees to recover their software development investments, as well as to gain some margin. However, if the vendor's customer base for a specific type of software is limited, then either the license fees are too high and hence the customers may pref…

ta113Social software engineeringComputer sciencebusiness.industrySoftware developmentComputer Science ApplicationsSoftware deploymentSoftware sizingSoftware constructionPersonal software processPackage development processBackportingbusinessSoftware engineeringSoftwareInformation SystemsInformation and Software Technology
researchProduct

Effect of Software on CSP Performance

2009

In order to verify how (if at all) CSP's investments in software affect their business performance, the relationship between (i) CSP's spending on software and (ii) its key performance indicators (KPIs) is considered below. The investments in software are represented by internal, external, and total software spending a year or two years prior to the KPI values, while the KPIs include average revenue per user (ARPU), revenue, net income, EBIDTA, and change in revenue (as an indicator of company growth). Besides, Opex and Capex along with R&D expenses are used as control variables. We use the data collected for the years 2004–2007 (revenue, net income, EBITDA, market capitalization, R&D, CAPE…

Market capitalizationNet incomeEconometricsControl variableRevenueAverage revenue per userRegression analysisBusinessPerformance indicatorOperating expense
researchProduct

Learning temporal patterns for anomaly intrusion detection

2002

For the last decade an explosive spread of computer systems and computer networks has resulted in a society that is increasingly dependent on information stored on these systems. A computer system connected to the network is accessible from another computer in this network regardless of its geographical position. Along with providing many benefits for legitimate users this technology creates almost unlimited opportunities for malicious persons, which using software vulnerabilities may successfully penetrate the networked computer systems. In order to eliminate potential devastating consequences caused by breaches in computer systems, more and more attention is drawn to the information secur…

SoftwareOrder (exchange)Network securitybusiness.industryComputer scienceVulnerabilityPattern matchingIntrusion detection systemInformation securityComputer securitycomputer.software_genrebusinesscomputerProceedings of the 2002 ACM symposium on Applied computing
researchProduct

Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage

2012

The volume of worldwide digital content has increased nine-fold within the last five years, and this immense growth is predicted to continue in foreseeable future reaching 8ZB already by 2015. Traditionally, in order to cope with the growing demand for storage capacity, organizations proactively built and managed their private storage facilities. Recently, with the proliferation of public cloud infrastructure offerings, many organizations, instead, welcomed the alternative of outsourcing their storage needs to the providers of public cloud storage services. The comparative cost-efficiency of these two alternatives depends on a number of factors, among which are e.g. the prices of the public…

business.industryComputer scienceDigital contentmedia_common.quotation_subjectcost modelCloud computingProvisioningEnvironmental economicsInformation repositoryComputer securitycomputer.software_genreOutsourcingstorage servicesService (economics)Converged storageacquisition intervalbusinessCloud storagecomputerverkkotallennusmedia_common2012 IEEE Fifth International Conference on Cloud Computing
researchProduct

Vertical Integration due to Small Market Size and High Product Development and Integration Costs

2009

An independent software vendor (ISV) recovers the costs of software development and configuration through license fees. However, if the number of ISV's customers is limited, then either the license fees needed for recovering the software development investments may be too high (and hence the customer would prefer to develop the software internally), or the ISV's margin may have to be decreased. Given the costs of development and configuration, as well as the margins set by the ISVs, it is possible to estimate how many customers an ISV has to have in order to recover its costs. Furthermore, given a market of a specific size and the minimum number of ISV's customers, it is possible to assess …

Competition (economics)Softwarebusiness.industryOrder (exchange)New product developmentSoftware developmentContext (language use)businessLicenseVertical integrationIndustrial organization
researchProduct

An Initial Security Analysis of the Personal Transaction Protocol

2003

Our society is becoming increasingly dependent on the rapid access and processing of information. The number of handheld mobile devices with access to the Internet and network-based software and services is exploding. Research indicates [1] that by the end of 2002 there will be over 1 billion mobile phone owners globally with Internet access, and that this number is going to grow exponentially in the nearest future. By 2006 the number of interconnected mobile device users is expected exceed the worldwide Internet subscriber population. It is estimated that in a few years there will be three times as many of these devices worldwide as personal computers.

education.field_of_studybusiness.product_categorybusiness.industryPopulationComputer securitycomputer.software_genreMobile phoneAuthentication protocolDistributed transactionInternet accessThe InternetBusinesseducationMobile deviceDatabase transactioncomputer
researchProduct

Managerial Growth Challenges in Small Software Firms: A Multiple-Case Study of Growth-Oriented Enterprises

2010

Notwithstanding the importance of small software firms, research focusing on understanding the growth challenges faced by their management is close to non-existent. By taking a life-cycle approach and focusing on managerial challenges, the aim of this paper is to analyze the growth process of small software firms. After forming a synthesis of possible growth challenges from relevant literature, the results are reflected upon case software firms using thematic interviews and questionnaires. According to the analysis of four software firms, managing human resources represents the greatest challenge for software services firms. Additionally, other challenges stem from competition and sales-rel…

Competition (economics)SoftwareConceptualizationbusiness.industryProcess (engineering)Multiple caseSoftware businessOperations managementbusinessHuman resourcesIndustrial organization
researchProduct

Evaluating Classifiers for Mobile-Masquerader Detection

2006

As a result of the impersonation of a user of a mobile terminal, sensitive information kept locally or accessible over the network can be abused. The means of masquerader detection are therefore needed to detect the cases of impersonation. In this paper, the problem of mobile-masquerader detection is considered as a problem of classifying the user behaviour as originating from the legitimate user or someone else. Different behavioural characteristics are analysed by designated one-class classifiers whose classifications are combined. The paper focuses on selecting the classifiers for mobile-masquerader detection. The selection process is conducted in two phases. First, the classification ac…

business.industryComputer scienceSmall numberLinear classifierPattern recognitionMachine learningcomputer.software_genreRandom subspace methodInformation sensitivityComputingMethodologies_PATTERNRECOGNITIONArtificial intelligencebusinesscomputerClassifier (UML)
researchProduct

Defining Complexity Factors for Architecture Evaluation Framework

2006

The design and implementation of telecommunication systems is an incremental and iterative process, and system architectures may need to be revised and refined several times during their lifetime. Formal evaluation facilitates the identification of the weak points, where improvements are due in these architectures. In the domain of telecommunications, such evaluation can be based on the Architecture Evaluation Framework (AEF). During the evaluation, a deep understanding of the processes within a system is needed. Meanwhile, the systems being designed are usually complex systems encompassing a large number of components with an intricate pattern of interaction between them. As a result, it i…

järjestelmäarkkitehtuurijärjestelmäsuunnitteluarviointimenetelmättietoliikennejärjestelmätarchitecture evaluationelinkaaricomplex systems
researchProduct

Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario

2006

In order to resist an unauthorized use of the resources accessible through mobile terminals, masquerader detection means can be employed. In this paper, the problem of mobile-masquerader detection is approached as a classification problem, and the detection is performed by an ensemble of one-class classifiers. Each classifier compares a measure describing user behavior or environment with the profile accumulating the information about past behavior and environment. The accuracy of classification is empirically estimated by experimenting with a dataset describing the behavior and environment of two groups of mobile users, where the users within groups are affiliated with each other. It is as…

Computer scienceMobile computingAnomaly detectionIntrusion detection systemData miningFalse rejectioncomputer.software_genrecomputerClassifier (UML)Similitude
researchProduct

Characteristics and Measures for Mobile-Masquerader Detection

2006

Personal mobile devices, as mobile phones, smartphones, and communicators can be easily lost or stolen. Due to the functional abilities of these devices, their use by an unintended person may result in a severe security incident concerning private or corporate data and services. Organizations develop their security policy and mobilize preventive techniques against unauthorized use. Current solutions, however, are still breakable and there still exists strong need for means to detect user substitution when it happens. A crucial issue in designing such means is to define what measures to monitor.

Computer scienceFunctional abilitiesSubstitution (logic)Computer securitycomputer.software_genreSecurity policycomputerMobile device
researchProduct

Cloud Services Pricing Models

2013

A major condition for commercial success is a well-defined pricing strategy, however, cloud service providers face many challenges around pricing. Clearness and transparency in pricing is beneficial for all the actors in the ecosystem, where the currently existing abundance of different pricing models makes decision making difficult for service providers, partners, customers and competitors. In this paper, the SBIFT pricing model is evaluated and updated to cloud context. As a result, a 7-dimensional cloud pricing framework is proposed that helps clarifying the possible pricing models in order to let companies differentiate themselves from competitors by price. The framework can be used als…

business.industryTransparency (market)Software as a serviceIaaSrevenue logicTheoryofComputation_GENERALCloud computinghinnoitteluCompetitor analysisService providerSaaSInvestment theoryEmpirical researchVariable pricingcloudBusinessPaaSMarketingIndustrial organization
researchProduct

Learning Temporal Regularities of User Behavior for Anomaly Detection

2001

Fast expansion of inexpensive computers and computer networks has dramatically increased number of computer security incidents during last years. While quite many computer systems are still vulnerable to numerous attacks, intrusion detection has become vitally important as a response to constantly increasing number of threats. In this paper we discuss an approach to discover temporal and sequential regularities in user behavior. We present an algorithm that allows creating and maintaining user profiles relying not only on sequential information but taking into account temporal features, such as events' lengths and possible temporal relations between them. The constructed profiles represent …

Network securitybusiness.industryComputer scienceAnomaly detectionArtificial intelligenceIntrusion detection systemData miningAnomaly (physics)businesscomputer.software_genrecomputer
researchProduct

A gap analysis of Internet-of-Things platforms

2016

We are experiencing an abundance of Internet-of-Things (IoT) middleware solutions that provide connectivity for sensors and actuators to the Internet. To gain a widespread adoption, these middleware solutions, referred to as platforms, have to meet the expectations of different players in the IoT ecosystem, including device providers, application developers, and end-users, among others. In this article, we evaluate a representative sample of these platforms, both proprietary and open-source, on the basis of their ability to meet the expectations of different IoT users. The evaluation is thus more focused on how ready and usable these platforms are for IoT ecosystem players, rather than on t…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer science02 engineering and technologyGap analysiscomputer.software_genreWorld Wide WebComputer Science - Computers and SocietyOrder (exchange)Computers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringesineiden internetIoT ecosystemIoT marketplaceta113internet of Thingsbusiness.industry020206 networking & telecommunicationsIoT platformsData sharingMiddleware (distributed applications)Middleware020201 artificial intelligence & image processingThe InternetbusinessInternet of Thingsgap analysiscomputerComputer Communications
researchProduct

Market Polarization due to Difference in Interface Implementation Efforts

2009

Another factor potentially affecting the evolution of the OSS/BSS software market is the high complexity of software interfaces. The software provided to a customer – a CSP – needs to be integrated with a number of heterogeneous subsystems deployed by the customer. If the number of integration interfaces is high, a vast amount of special knowledge is needed in the vendor organization. High integration efforts also take up the time of the compentent employees of the vendor organization, thereby reducing the number of customers which it is capable of serving. As a result, only few large vendors can compete in such market, and, due to a lack of competition, the evolution towards a horizontaliz…

Vendorbusiness.industryInterface (computing)Polarization (politics)Competition (economics)SoftwareRisk analysis (engineering)High complexityFactor (programming language)MarketingbusinesscomputerSoftware marketcomputer.programming_language
researchProduct

A framework for evaluating Internet-of-Things platforms: Application provider viewpoint

2014

Widespread adoption of Internet of Things (IoT) applications assumes a sustainable ecosystem of firms creating, distributing, and using these applications. Such an ecosystem often forms around a platform that implements commonly used functionality and offers it to the members of the ecosystem for creating applications and services. In IoT, such a platform may be materialized in a form of a cloud platform that supports the management of connected devices, and the development and use of the applications based on them. A number of cloud platforms targeting IoT applications are available in the market; to prosper, they need to assist the providers of the IoT applications in designing and develo…

Cover (telecommunications)Javabusiness.industryComputer scienceCloud computingApplication softwarecomputer.software_genreMaturity (finance)World Wide WebSoftwareThe InternetbusinessInternet of Thingscomputercomputer.programming_language2014 IEEE World Forum on Internet of Things (WF-IoT)
researchProduct

A framework for behavior-based detection of user substitution in a mobile context

2007

Personal mobile devices, such as mobile phones, smartphones, and communicators can be easily lost or stolen. Due to the functional abilities of these devices, their use by unintended persons may result in severe security breaches concerning private or corporate data and services. Organizations develop their security policy and employ preventive techniques to combat unauthorized use. Current solutions, however, are still breakable and there is a strong need for means to detect user substitution when it happens. A crucial issue in designing such means is to define the measures to be monitored. In this paper, a structured conceptual framework for mobile-user substitution detection is proposed.…

General Computer ScienceComputer sciencemedia_common.quotation_subjectUser modelingSubstitution (logic)Computer user satisfactionIntrusion detection systemComputer securitycomputer.software_genreSecurity policyUser interface designHuman–computer interactionPersonalityLawcomputerMobile devicemedia_commonComputers & Security
researchProduct

Defining an Internet-of-Things Ecosystem

2012

By bringing the Internet connectivity to the things, the Internet-of-Things (IoT) promises a number of benefits to its customers, varying from faster and more accurate sensing of our environment, to more cost-efficient tracking of industrial processes. Likewise, from the business perspective, the wide adoption of IoT is expected to generate significant revenues to the providers of IoT application and services. The IoT adoption depends on whether the ecosystems of the companies focusing on IoT technologies would emerge and succeed in delivering to the market the solutions attractive to the customers. Therefore, it is of utmost importance to understand the essence and constituents of IoT ecos…

EngineeringKnowledge managementbusiness.industryRevenueThe InternetEcosystemBusiness ecosystemInternet of ThingsbusinessLiterature survey
researchProduct

Adoption of Constrained Application Protocol

2016

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…

Computer sciencebusiness.industryPerspective (graphical)Techno economic020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreConstrained Application ProtocolWeb of ThingsRisk analysis (engineering)Software deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe InternetLiterature surveybusinesscomputerProtocol (object-oriented programming)International Journal of Innovation in the Digital Economy
researchProduct

Costs of Using Hybrid Cloud Infrastructure: Towards a General Framework

2012

Cloud computing infrastructure is a state-of-the-art computing as a utility paradigm, offering individuals and organizations instantly-available and scalable computing capacity. Organizations may deploy the cloud infrastructure in own data centers, as a private cloud, or use the public on-demand cloud infrastructure charged on a pay-per-use basis. The organizations may also adopt a hybrid solution, i.e. use public cloud capacity to complement the resources in the private cloud, e.g. during the periods of rapid growth in the demand. One of the important factors that affect the organizations’ decisions to adopt a hybrid cloud is the total cost of acquiring and managing the infrastructure. In …

Cost assessmentComputer scienceTotal costbusiness.industryHybrid solutionCloud computingEnvironmental economicsScalable computingbusinessSimulation
researchProduct

Using recursive Bayesian estimation for matching GPS measurements to imperfect road network data

2010

Map-matching refers to the process of projecting positioning measurements to a location on a digital road network map. It is an important element of intelligent transportation systems (ITS) focusing on driver assistance applications, on emergency and incident management, arterial and freeway management, and other applications. This paper addresses the problem of map-matching in the applications characterized by imperfect map quality and restricted computational resources - e.g. in the context of community-based ITS applications. Whereas a number of map-matching methods are available, often these methods rely on topological analysis, thereby making them sensitive to the map inaccuracies. In …

business.industryComputer scienceProbabilistic logicMap matchingcomputer.software_genreBayes' theoremIdentification (information)Global Positioning SystemMaximum a posteriori estimationData miningbusinessRecursive Bayesian estimationIntelligent transportation systemcomputer13th International IEEE Conference on Intelligent Transportation Systems
researchProduct

Efficient Utilization of Patterns in Mobile Application Development

2012

Development (topology)Architectural patternComputer architectureComputer sciencebusiness.industryEmbedded systembusinessArchitectural model
researchProduct

Modelling Dependencies Between Classifiers in Mobile Masquerader Detection

2004

The unauthorised use of mobile terminals may result in an abuse of sensitive information kept locally on the terminals or accessible over the network. Therefore, there is a need for security means capable of detecting the cases when the legitimate user of the terminal is substituted. The problem of user substitution detection is considered in the paper as a problem of classifying the behaviour of the person interacting with the terminal as originating from the user or someone else. Different aspects of behaviour are analysed by designated one-class classifiers whose classifications are subsequently combined. A modification of majority voting that takes into account some of the dependencies …

Scheme (programming language)Majority ruleComputer sciencebusiness.industrySubstitution (logic)Base (topology)Machine learningcomputer.software_genreInformation sensitivityTerminal (electronics)Artificial intelligenceData miningbusinesscomputercomputer.programming_language
researchProduct

One-Class Classifiers : A Review and Analysis of Suitability in the Context of Mobile-Masquerader Detection

2007

One-class classifiers employing for training only the data from one class are justified when the data from other classes is difficult to obtain. In particular, their use is justified in mobile-masquerader detection, where user characteristics are classified as belonging to the legitimate user class or to the impostor class, and where collecting the data originated from impostors is problematic. This paper systematically reviews various one-class classification methods, and analyses their suitability in the context of mobile-masquerader detection. For each classification method, its sensitivity to the errors in the training set, computational requirements, and other characteristics are consi…

Training setbusiness.industryComputer scienceMasquerader DetectionContext (language use)General Medicine[MATH] Mathematics [math]Mobile Terminal Security[INFO] Computer Science [cs]Machine learningcomputer.software_genreClass (biology)Computer ScienceClassification methodsSensitivity (control systems)Artificial intelligencebusinesscomputerOne-class ClassifiersMathematics
researchProduct

Support for Knowledge and Innovations in Software Development – Community within Company: Inner Source Environment

2007

This case study considers a software development support portal adapted from open source developer communities into a company internal, so called inner-source development environment. With theoretical insights into knowledge management (KM) models, recent advancements in KM theory building, and observations of the inner source platform we make observations as regarding the KM approach and suggestions for its further development. Both technological and human components of KM are considered. The results of this study, can be generally applicable to the knowledge creation and innovation support in software development. We believe that many software companies are following the example and build…

oppiva organisaatioKnowledge managementComputer sciencebusiness.industryohjelmistotekniikkaohjelmistotuotantoSoftware developmentvirtuaaliympäristöorganizational memorytietämyksenhallintavirtuaaliympäristötorganisaatiomuistiorganizational learningbusiness
researchProduct

Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications

2013

Part 6: Monitoring Mechanisms; International audience; Internet-of-Things (IoT) is envisioned to provide connectivity to a vast number of sensing or actuating devices with limited computational and communication capabilities. For the organizations that manage these constrained devices, the monitoring of each device’s operational status and performance level as well as the accounting of their resource usage are of great importance. However, monitoring and accounting support is lacking in today’s IoT platforms. Hence, this paper studies the applicability of the Constrained Application Protocol (CoAP), a lightweight transfer protocol under development by IETF, for efficiently retrieving monito…

10009 Department of InformaticsComputer scienceDistributed computingInternet of ThingsReal-time computingMonitoring and Accounting Infrastructure020206 networking & telecommunications02 engineering and technology000 Computer science knowledge & systemsSimple Network Management ProtocolConstrained Application ProtocolSecurity Assertion Markup Language[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Resource (project management)CoAPAccounting information system0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]esineiden internet020201 artificial intelligence & image processing1700 General Computer Science2614 Theoretical Computer ScienceWireless sensor networkProtocol (object-oriented programming)
researchProduct

Software Business in the Telecommunications Sector

researchProduct