Kari Luostarinen

Learn More
Access to information systems across corporate boundaries with high demands to privacy and trust result into ambitious research and development targets. This study provides motivation and a roadmap for approaching integrated security management solutions in a business network of partners with heterogeneous ICT and security infrastructures. We aim at(More)
This paper presents a packet scheduling scheme for ensuring delay and bandwidth as a quality of service (QoS) requirement. For customers, rightful service is given while optimizing revenue of the network service provider. A gradient and fixed point type algorithms for updating the weights of a packet scheduler are derived from a revenue-based optimization(More)
We describe a multilayer perceptron model to predict the laboratory measurements of paper quality using the instantaneous state of the papermaking production process. Actual industrial data from a pilot paper machine was used. The final model met its goal accuracy 95.7% of the time at best (tensile index quality) and 66.7% at worst (beta formation). We(More)
— IEEE 802.16 standard defines the wireless broadband technology called WiMAX. When compared to other wireless technologies, it introduces many interesting advantages at physical (PHY) and media access control (MAC) layers. The WiMAX technology based on air interface standard 802.16 wireless metropolitan area network (MAN) is configured in the same way as a(More)
—Wireless networks are one of the most essential components of the communication networks. In contrast to the wired networks, the inherent broadcast nature of wireless networks provides a breeding ground for both opportunities and challenges ranging from security to reliability. Moreover, energy is a fundamental design constraint in wireless networks. The(More)
Remote controlling of industrial systems requires a special approach. There are requirements for both the connection and the access terminals. The connection should provide users with reliability, security and quality, and the access terminals should be able to perform the required task. One important and at the same time a problematic requirement for a(More)