UCT CS Research Document Archive

Laboratory: Data Network Architectures

    2009

    Conference Paper

    1. Symington, A and PS Kritzinger (2009) A Hardware Test Bed for Measuring IEEE 802.11g Distribution Coordination Function Performance. In Proceedings 2009 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), pages 61-67, London.

    Departmental Technical Report

    1. Pileggi, Paolo, Giuseppe Iazeolla and Pieter Kritzinger (2009) The IEEE802.16d Fixed WMAN – a definitive description of the network to be simulated. Technical Report CS09-01-00, Department of Computer Science, University of Cape Town.

    2. Symington, Andrew and Pieter Kritzinger (2009) A Hardware Test Bed for Measuring IEEE 802.11g DCF Performance. Technical Report CS09-02-00, Department of Computer Science, University of Cape Town.

    Electronic Thesis or Dissertation

    1. Pileggi, Paolo (2009) Cross-Layer RaCM Design for Vertically Integrated Wireless Networks. MSc, Department of Computer Science, University of Cape Town.

    2. Symington, Andrew (2009) A Hardware Testbed for Measuring IEEE 802.11g DCF Performance. MSc, Department of Computer Science, University of Cape Town.

    2008

    Conference Paper

    1. Arnab, Alapan and Andrew Hutchison (2008) An Evaluation Framework for DRM. In Grimm, Ruediger and Susanne Guth, Eds. Proceedings The 6th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods, incorporating The 4th International ODRL Workshop, pages 176-200, Poznan, Poland.

    2. Iazeolla, G, PS Kritzinger and PP Pileggi (2008) Modelling Quality of Service in IEEE 802.16 Networks. In Proceedings 16th International Conference on Software, Telecommunications and Computer Networks, Split - Dubrovnik, Croatia.

    Departmental Technical Report

    1. Forconi, Sonia, Giuseppe Iazeolla, Pieter Kritzinger and Paolo Pillegi (2008) Modelling Internet Workloads for IEEE 802.16. Technical Report CS08-03-00, Department of Computer Science, University of Cape Town.

    2. Kritzinger, PS and H Krüger (2008) Software Traceability using Latent Semantic Analysis and Relevance Feedback. Technical Report CS08-01-00, Department of Computer Science, University of Cape Town.

    3. Kritzinger, PS and Hans Krüger (2008) Automated Retrieval of Artifacts Created during the Software Development Life-cycle. Technical Report CS08-02-00, Department of Computer Science, University of Cape Town.

    2007

    Conference Paper

    1. Arnab, Alapan and Andrew Hutchison (2007) DRM Use License Negotiation using ODRL v2.0. In Proceedings 5th International Workshop for Technology, Economy, and Legal Aspects of Virtual Goods, incorporating the 3rd International ODRL Workshop., Koblenz, Germany.

    2. Arnab, Alapan and Andrew Hutchison (2007) Persistent Access Control: A Formal Model for DRM. In Proceedings Seventh ACM Workshop on Digital Rights Management (ACM-DRM), held in conjunction with CCS 2007, the Thirteenth ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA.

    3. Arnab, Alapan and Andrew Hutchison (2007) Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions. In Venter, Hein, Mariki Eloff, Les Labuschagne and Rossouw von Solms, Eds. Proceedings IFIP TC-11, 22nd International Information Security Conference (Sec 2007), pages 277-288, Sandton, South Africa.

    4. Arnab, Alapan, Marlon Paulse, Duncan Bennett and Andrew Hutchison (2007) Experiences in Implementing a Kernel-Level DRM Controller. In Delgado, Jaime, Kia Ng, Paolo Nesi and Pierfrancesco Bellini, Eds. Proceedings 3rd International Conference of Automated Production of Cross Media Content for Multi-channel Distribution (AMXEDIS), pages 39-46, Barcelona, Spain.

    5. Kritzinger, PS and PP Pileggi (2007) Performance Modeling of the Wireless Internet. In Proceedings Wireless Rural and Emergancy Communication Conference 2007, Rome, Italy.

    Departmental Technical Report

    1. Arnab, Alapan, Marlon Paulse, Duncan Bennett and Andrew Hutchison (2007) Experiences in Implementing a Kernel-Level DRM Controller. Technical Report CS07-01-00, Department of Computer Science, University of Cape Town.

    2. Asherson, Stephen, Pieter Kritzinger and Paolo Pileggi (2007) Wireless Standards and Mesh Networks.. Technical Report CS07-02-00, Department of Computer Science, University of Cape Town.

    Electronic Thesis or Dissertation

    1. Arnab, Alapan (2007) Towards a General Framework for Digital Rights Management (DRM). PhD, Department of Computer Science, University of Cape Town.

    2. van Rooyen, Reinhardt (2007) A Transaction Assurance Framework For Web Service. MSc, Department of Computer Science, University of Cape Town.

    2006

    Conference Paper

    1. Arnab, Alapan and Andrew Hutchison (2006) Piracy and Content Protection in the Broadband Age. In Proceedings Southern African Telecommunication Networks and Applications Conference (SATNAC) 2006, Spier Wine Estate, Stellenbosch, South Africa.

    2. Arnab, Alapan and Andrew Hutchison (2006) Ticket based Identity System for DRM. In Proceedings Information Security South Africa, Balalaika Hotel, Sandton, South Africa.

    3. Arnab, Alapan and Andrew Hutchison (2006) Verifiable Digital Object Identity System. In Kurosawa, Kaoru, Rei Safavi-Naini and Moti Yung, Eds. Proceedings Sixth ACM Workshop on Digital Rights Management (ACM-DRM), held in conjunction with CCS 2006, the Thirteenth ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA.

    4. McMahon, Peter and Andrew Hutchison (2006) A security architecture for high performance computing facilities. In Proceedings Information Security South Africa, Balalaika Hotel, Sandton, South Africa.

    5. van Rooyen, Reinhardt and Andrew Hutchison (2006) Composite Web Services Security Considerations. In Proceedings Southern African Telecommunicaion, Networks and Applications Conference (SATNAC) 2006, Spier Wine Estate, Stellenbosch, South Africa.

    Conference Poster

    1. Asherson, Stephen and Andrew Hutchison (2006) Secure Routing for Wireless Mesh Networks. In Proceedings Southern African Telecommunication Networks and Applications Conference (SATNAC) 2006, Spier Wine Estate, Stellenbosch, South Africa.

    2. Krueger, Hans-Peter and Pieter Kritzinger (2006) Latent Semantic Indexing as a Technique for Discovering Traceability Links. In Proceedings Southern African Telecommunications Networks and Applications Conference (SATNAC 2006), Spier Wine Estate, Stellenbosch, South Africa.

    3. Schoeman, Christof and Pieter Kritzinger (2006) Enterprise Storage System Performance Modelling and Analysis. In Proceedings Southern African Telecommunicaion, Networks and Applications Conference (SATNAC) 2006 Telecommunication Networks and Applications Conference (SATNAC) 2006, Spier Wine Estate, Stellenbosch, South Africa.

    Presentation

    1. Arnab, Alapan (2006) DRM - Not Necessarily Evil. Presented at 5th INDICARE Workshop on Human Factors of DRM, Budapest, Hungary.

    Departmental Technical Report

    1. Pileggi, Paolo and Pieter Kritzinger (2006) Models of Hybrid Wireless Networks with Realistic Workloads. Technical Report CS06-17-01, Department of Computer Science, University of Cape Town.

    2. Sikalinda, Paul, Lourens Walters and Pieter S Kritzinger (2006) A Storage System Workload Analyzer. Technical Report CS06-02-00, Department of Computer Science, University of Cape Town.

    Electronic Thesis or Dissertation

    1. Sikalinda, Paul (2006) Analyzing Storage System Workloads. MSc, Department of Computer Science, University of Cape Town.

    2005

    Conference Paper

    1. Arnab, Alapan and Andrew Hutchison (2005) Fairer Usage Contracts For DRM. In Proceedings Fifth ACM Workshop on Digital Rights Management, held in conjunction with CCS 2005, the Twelfth ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA.

    2. Arnab, Alapan and Andrew Hutchison (2005) Extending ODRL to Enable Bi-Directional Communication. In Proceedings Second International ODRL Workshop, ADETTI / ISCTE, Lisbon, Portugal.

    3. Arnab, Alapan and Andrew Hutchison (2005) Requirement Analysis of Enterprise DRM systems. In Proceedings Information Security South Africa, Hotel Balalaika, Sandton, Johannesburg.

    4. Landman, Jesse and Pieter Kritzinger (2005) Delay Analysis of Downlink IP Traffic on UMTS Mobile Networks. In Proceedings IFIP WG 7.3 International Symposium on Computer Performance, Modeling, Measurements and Evaluation, Juan-les-Pins, France.

    5. Sikalinda, Paul G., Pieter S. Kritzinger and Lourens O. Walters (2005) Analyzing Storage System Workloads. In Proceedings Southern African Telecomunication Networks & Applications Conference, Central Drakensberg, Kwazulu Natal, South Africa.

    Conference Poster

    1. Arnab, Alapan, Duncan Bennett, Marlon Paulse and Andrew Hutchison (2005) Performance Implications of a Kernel Level DRM Controller. In Proceedings Southern African Telecommunicaion, Networks & Applications Conference (SATNAC) 2005, Central Drakensberg, South Africa.

    2. Perumal, S and PS Kritzinger (2005) Automation of RAID Controller Operation Using ROSTI. In Proceedings SATNAC 2005, Champagne Valley Sports Resort.

    Journal (Paginated)

    1. de Wet, Nico and Pieter Kritzinger (2005) Using UML models for the performance analysis of network systems. Computer Networks 49(5):627-642.

    2. Landman, Jesse and Pieter Kritzinger (2005) Delay analysis of downlink IP traffic on UMTS mobile networks. Performance Evaluation 62(1-4):68-82.

    3. Ryndina, Ksenia and Pieter Kritzinger (2005) Analysis of Structured Use Case Models through Model Checking. South African Computer Journal(35):84-96.

    Departmental Technical Report

    1. Arnab, Alapan and Andrew Hutchison (2005) Specifications for a Componetised Digital Rights Management (DRM) Framework. Technical Report CS05-03-00, Department of Computer Science, University of Cape Town.

    2. Bennett, Duncan, Marlon Paulse, Alapan Arnab and Andrew Hutchison (2005) The Implications of an Operating System Level DRM Controller. Technical Report CS05-14-00, Department of Computer Science, University of Cape Town.

    3. Ryndina, Ksenia and Pieter Kritzinger (2005) Analysis of Structured Use Case Models through Model Checking. Technical Report CS05-02-00, Department of Computer Science, University of Cape Town.

    Electronic Thesis or Dissertation

    1. de Wet, Nico (2005) Model Driven Communication Protocol Engineering and Simulation based Performance Analysis using UML 2.0. MSc, Department of Computer Science, University of Cape Town.

    2. Ryndina, Ksenia (2005) Improving Requirements Engineering: An Enhanced Requirements Modelling and Analysis Method. MSc, Department of Computer Science, University of Cape Town.

    3. Tobler, Benjamin (2005) A Structured Approach to Network Security Protocol Implementation. MSc, Department of Computer Science, University of Cape Town.

    2004

    Conference Paper

    1. Arnab, Alapan and Andrew CM Hutchison (2004) Digital Rights Management - An Overview of current challenges and solutions. In Venter, HS, JHP Eloff, L Labuschagne and MM Eloff, Eds. Proceedings Information Security South Africa (ISSA), Gallagher Estate, Midrand, South Africa.

    2. Arnab, Alapan and Andrew Hutchison (2004) Security Considerations for an Idealised DRM Framework. In Proceedings Southern African Telecommunication Networks and Applications Conference (SATNAC) 2004, Spier Wine Estate.

    3. Consani, Colette (2004) Quality of Service of IEEE 802.11e. In Proceedings Southern African Telecommunication Networks and Applications Conference (SATNAC) 2004, Spier Wine Estate.

    4. de Wet, Nico Dirk and Pieter S. Kritzinger (2004) Using UML Models for the Performance Analysis of Network Systems. In Proceedings Workshop on Integrated-reliability with Telecommunications and UML Languages (WITUL), Rennes, Brittany, France.

    5. De Wet, Nico and Pieter Kritzinger (2004) Towards Model-Based Communication Protocol Performability Analysis with UML 2.0. In Proceedings Southern African Telecommunication Networks and Applications Conference (SATNAC) 2004, Spier Wine Estate.

    6. de Wet, Nico and Pieter Kritzinger (2004) Using UML models for the performance analysis of network systems. In Proceedings ISSRE04 Workshop on Integrated-reliability with Telecommunications and UML Languages (ISSRE04:WITUL), IRISA Rennes France.

    7. Lukell, Simon and Andrew Hutchison (2004) Selection of an Attack-Construction Engine to Enhance Security Protocol Analysis. In Proceedings Southern African Telecommunication Networks and Applications Conference (SATNAC) 2004, Spier Wine Estate.

    8. Ryndina, Oksana and Pieter Kritzinger (2004) Improving Requirements Specification for Communication Services with Formalised Use Case Models. In Proceedings Southern African Telecommunication Networks and Applications Conference (SATNAC) 2004, Spier Wine Estate.

    9. Tobler, Benjamin and Andrew Hutchison (2004) Generating Network Security Protocol Implementations from Formal Specifications. In Nardelli, Enrico, Sabina Posadziejewski and Maurizmo Talamo, Eds. Proceedings IFIP World Computer Congress - CSES 2004 2nd International Workshop on Certification and Security in Inter-Organizational E-Services, Toulouse, France.

    Conference Poster

    1. Landman, Jesse and Pieter Kritzinger (2004) DS-CDMA Fading Channels with Bursty IP Traffic Arrivals. In Proceedings WiOpt 2004, Cambridge, England.

    Departmental Technical Report

    1. Arnab, Alapan and Andrew Hutchison (2004) Digital Rights Management - A current review. Technical Report CS04-04-00, Department of Computer Science, University of Cape Town.

    2. Arnab, Alapan and Andrew Hutchison (2004) Distributed DRM System. Technical Report CS04-27-00, Department of Computer Science, University of Cape Town.

    3. Arnab, Alapan and Andrew Hutchison (2004) Extending ODRL and XrML to Enable Bi-Directional Communication. Technical Report CS04-28-00, Department of Computer Science, University of Cape Town.

    4. de Wet, Nico Dirk and Pieter S. Kritzinger (2004) Model-Based EIS Performability Analysis. Technical Report CS04-01-00, Department of Computer Science, University of Cape Town.

    5. Muvuti, Fadzai and Mbamwabi Ntheye Lungu (2004) Service Oriented Architecture for a Software Traceability System. Technical Report CS04-14-00, Department of Computer Science, University of Cape Town.

    6. Perumal, Sameshan and Pieter Kritzinger (2004) A Tutorial on RAID Storage Systems. Technical Report CS04-05-00, Department of Computer Science, University of Cape Town.

    7. Ryndina, Oksana and Pieter Kritzinger (2004) Improving Requirements Specification: Verification of Use Case Models with Susan. Technical Report CS04-06-00, Department of Computer Science, University of Cape Town.

    Electronic Thesis or Dissertation

    1. Chibesakunda, Mwelwa K. (2004) A Methodology for Analyzing Power Consumption in Wireless Communication Systems. MSc, Department of Computer Science, University of Cape Town.

    2. Lifson, Farrel (2004) Specification and Verification of Systems Using Model Checking and Markov Reward Models. MSc, Department of Computer Science, University of Cape Town.

    3. Walters, Lourens 0. (2004) A Web Browsing Workload for Simulation. MSc, Department of Computer Science, University of Cape Town.

    2003

    Conference Paper

    1. Kritzinger, Pieter, Marshini Chetty, Jesse Landman, Michael Marconi and Oksana Ryndina (2003) ChattaBox: A Case Study in Using UML and SDL for Engineering Concurrent Communicating Software Systems. In Proceedings Southern African Telecommunications Networks and Applications Conference, George, South Africa.

    2. Lifson, Farrel (2003) Verification of Service Level Agreements with Markov Reward Models. In Proceedings Southern African Telecommunications Networks and Applications Conference 2003., George , South Africa, 2003..

    3. Lukell, Simon and Andrew Hutchison (2003) Attack Analysis of Cryptographic Protocols Using Strand Spaces. In Proceedings 3rd annual Information Security South Africa Conference, Pretoria, South Africa.

    4. Lukell, Simon and Andrew Hutchison (2003) Automated Attack Analysis and Code Generation in a Multi-Dimensional Security Protocol Engineering Framework. In Proceedings Southern African Telecommunications Networks and Applications Conference 2003., George , South Africa.

    5. Tobler, Ben and ACM Hutchison (2003) Generation, Analysis and Verification of Cryptographic Protocol Implementations. In Eloff, JHP, HS Venter, L Labuschagne and MM Eloff, Eds. Proceedings 3rd annual Information Security South Africa Conference, pages 297-306, Sandton Convention Centre, Sandton, South Africa.

    Journal (Paginated)

    1. Lukell, Simon and Andrew CM Hutchison (2003) Attack Analysis of Cryptographic Protocols Using Strand Spaces. South African Computer Journal 31:25-32.

    Departmental Technical Report

    1. Chibesakunda, Mwelwa K and Pieter Kritzinger (2003) A Methodology for Analyzing Power Consumption in Wireless Communication Systems. Technical Report CS03-28-00, Department of Computer Science, University of Cape Town.

    2. Landman, Jesse (2003) Modelling a DS-CDMA fading Channel with Bursty Traffic Arrivals. Technical Report CS04-02-00, Department of Computer Science, University of Cape Town.

    Electronic Thesis or Dissertation

    1. Appenzeller, Johannes (2003) Real Time System Development with UML: A Case Study. Other, Communication Systems Division, School of Computer and Communication Sciences, Swiss Federal Institute of Technology.

    2002

    Departmental Technical Report

    1. Chetty, Marshini (2002) A Comparison of Unified Modelling Language (UML) and Specification and Description Language (SDL). Technical Report 02-01-00, Department of Computer Science, University of Cape Town.

    2. Walters, Lourens O and Pieter S Kritzinger (2002) Email Message Interarrival Time Analysis. Technical Report, Department of Computer Science, University of Cape Town.

    2001

    Conference Paper

    1. Elton, Saul and Andrew Hutchison (2001) Using GYPSIE, GYNGER and Visual GNY to Analyze Cryptographic Protocols in SPEAR II. In Proceedings Eighth Annual Working Conference on Information Security Management and Small Systems Security, Las Vegas, Nevada, USA.

    2. Saul, Elton and Andrew Hutchison (2001) An Environment to Facilitate the Teaching of GNY-Based Security Protocol Analysis Techniques. In Proceedings Second World Conference in Information Security Education, Edith Cowen University, Perth, Western Australia.

    2000

    Conference Paper

    1. Saul, Elton and Andrew Hutchison (2000) A Generic Graphical Specification Environment for Security Protocol Modelling. In Proceedings Sixth Annual Working Conference on Information Security, Beijing, China.

    Journal (Paginated)

    1. Knottenbelt, WJ, PG Harrison, MA Mestern and PS Kritzinger (2000) A Probabilistic Dynamic Technique for the Distributed Generation of Very Large State Spaces. Performance Evaluation Journal 39(1-4):127-148.

    2. Saul, Elton and Andrew Hutchison (2000) A Graphical Environment for the Facilitation of Logic-Based
      Security Protocol Analysis. South African Computer Journal(26):196-200.

    Newspaper/Magazine Article

    1. Walters, Lourens O and Pieter S Kritzinger (2000) Cellular Networks: Past, Present, and Future. In ACM Crossroads Student Magazine.

    1999

    Conference Paper

    1. Saul, Elton and Andrew Hutchison (1999) SPEAR II - The Security Protocol Engineering and Analysis Resource. In Proceedings 2nd South African Telecommunications, Networks and Applications Conference (SATNAC'99), Durban , South Africa.

    This list was generated on Fri Oct 20 16:15:41 SAST 2017.